Synopsis:          Important: kernel security update
Advisory ID:       SLSA-2014:2008-1
Issue Date:        2014-12-17
CVE Numbers:       CVE-2014-9322
--

* A flaw was found in the way the Linux kernel handled GS segment register
base switching when recovering from a #SS (stack segment) fault on an
erroneous return to user space. A local, unprivileged user could use this
flaw to escalate their privileges on the system. (CVE-2014-9322,
Important)

The system must be rebooted for this update to take effect.
--

SL5
  x86_64
    kernel-2.6.18-400.1.1.el5.x86_64.rpm
    kernel-debug-2.6.18-400.1.1.el5.x86_64.rpm
    kernel-debug-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm
    kernel-debug-devel-2.6.18-400.1.1.el5.x86_64.rpm
    kernel-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm
    kernel-debuginfo-common-2.6.18-400.1.1.el5.x86_64.rpm
    kernel-devel-2.6.18-400.1.1.el5.x86_64.rpm
    kernel-headers-2.6.18-400.1.1.el5.x86_64.rpm
    kernel-xen-2.6.18-400.1.1.el5.x86_64.rpm
    kernel-xen-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm
    kernel-xen-devel-2.6.18-400.1.1.el5.x86_64.rpm
  i386
    kernel-2.6.18-400.1.1.el5.i686.rpm
    kernel-PAE-2.6.18-400.1.1.el5.i686.rpm
    kernel-PAE-debuginfo-2.6.18-400.1.1.el5.i686.rpm
    kernel-PAE-devel-2.6.18-400.1.1.el5.i686.rpm
    kernel-debug-2.6.18-400.1.1.el5.i686.rpm
    kernel-debug-debuginfo-2.6.18-400.1.1.el5.i686.rpm
    kernel-debug-devel-2.6.18-400.1.1.el5.i686.rpm
    kernel-debuginfo-2.6.18-400.1.1.el5.i686.rpm
    kernel-debuginfo-common-2.6.18-400.1.1.el5.i686.rpm
    kernel-devel-2.6.18-400.1.1.el5.i686.rpm
    kernel-headers-2.6.18-400.1.1.el5.i386.rpm
    kernel-xen-2.6.18-400.1.1.el5.i686.rpm
    kernel-xen-debuginfo-2.6.18-400.1.1.el5.i686.rpm
    kernel-xen-devel-2.6.18-400.1.1.el5.i686.rpm
  noarch
    kernel-doc-2.6.18-400.1.1.el5.noarch.rpm

- Scientific Linux Development Team