User: Password:
|
|
Subscribe / Log in / New account

Mageia alert MGASA-2014-0207 (kernel-linus)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2014-0207: Updated kernel-linus packages fixes multiple bugs and vulnerabilities
Date:  Thu, 8 May 2014 23:51:43 +0200
Message-ID:  <20140508215143.E8B3B41913@valstar.mageia.org>

MGASA-2014-0207 - Updated kernel-linus packages fixes multiple bugs and vulnerabilities Publication date: 08 May 2014 URL: http://advisories.mageia.org/MGASA-2014-0207.html Type: security Affected Mageia releases: 4 CVE: CVE-2014-0049, CVE-2014-0055, CVE-2014-0069, CVE-2014-0077 Description: Updated kernel-linus provides upstream 3.12.18 kernel and fixes the following security issues: Buffer overflow in the complete_emulated_mmio function in arch/x86/kvm/ x86.c in the Linux kernel before 3.13.6 allows guest OS users to execute arbitrary code on the host OS by leveraging a loop that triggers an invalid memory copy affecting certain cancel_work_item data. (CVE-2014-0049) The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors. (CVE-2014-0055) The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer. (CVE-2014-0069) drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. (CVE-2014-0077) Oter fixes in this update: - switch hugepages back to madvise to fix performance regression (mga#12994) - enable Intel P-state driver (mga#13080) - fix r8169 suspend/resume issue (mga#13255) For upstream merged fixes, read the referenced changelogs: References: - https://bugs.mageia.org/show_bug.cgi?id=12994 - https://bugs.mageia.org/show_bug.cgi?id=13080 - https://bugs.mageia.org/show_bug.cgi?id=13255 - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - https://bugs.mageia.org/show_bug.cgi?id=13265 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0049 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0055 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0077 SRPMS: - 4/core/kernel-linus-3.12.18-1.mga4


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds