Synopsis: Important: kernel security update Advisory ID: SLSA-2014:2010-1 Issue Date: 2014-12-18 CVE Numbers: CVE-2014-9322 -- * A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS (stack segment) fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2014-9322, Important) The system must be rebooted for this update to take effect. -- SL7 x86_64 kernel-3.10.0-123.13.2.el7.x86_64.rpm kernel-debug-3.10.0-123.13.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-123.13.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-123.13.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-123.13.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-123.13.2.el7.x86_64.rpm kernel-devel-3.10.0-123.13.2.el7.x86_64.rpm kernel-headers-3.10.0-123.13.2.el7.x86_64.rpm kernel-tools-3.10.0-123.13.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-123.13.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-123.13.2.el7.x86_64.rpm perf-3.10.0-123.13.2.el7.x86_64.rpm perf-debuginfo-3.10.0-123.13.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-123.13.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-123.13.2.el7.x86_64.rpm python-perf-3.10.0-123.13.2.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-123.13.2.el7.noarch.rpm kernel-doc-3.10.0-123.13.2.el7.noarch.rpm - Scientific Linux Development Team