Mageia alert MGASA-2014-0318 (kernel)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2014-0318: Updated kernel packages fix security vulnerabilities | |
Date: | Tue, 5 Aug 2014 23:36:44 +0200 | |
Message-ID: | <20140805213644.A385F5CA02@valstar.mageia.org> |
MGASA-2014-0318 - Updated kernel packages fix security vulnerabilities Publication date: 05 Aug 2014 URL: http://advisories.mageia.org/MGASA-2014-0318.html Type: security Affected Mageia releases: 3 CVE: CVE-2014-0206, CVE-2014-4171, CVE-2014-4508, CVE-2014-5077 Description: This kernel update provides the upstream 3.10.50 longterm kernel and fixes the following security issues: Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value (CVE-2014-0206). mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (CVE-2014-4171). arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000 (CVE-2014-4508). Linux kernel built with the support for Stream Control Transmission Protocol (CONFIG_IP_SCTP) is vulnerable to a NULL pointer dereference flaw. It could occur when simultaneous new connections are initiated between a same pair of hosts. A remote user/program could use this flaw to crash the system kernel resulting in DoS (CVE-2014-5077). References: - https://bugs.mageia.org/show_bug.cgi?id=13802 - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0206 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077 SRPMS: - 3/core/kernel-3.10.50-1.mga3 - 3/core/kernel-userspace-headers-3.10.50-1.mga3 - 3/core/kmod-vboxadditions-4.3.10-10.mga3 - 3/core/kmod-virtualbox-4.3.10-10.mga3 - 3/core/kmod-xtables-addons-2.3-20.mga3 - 3/nonfree/kmod-broadcom-wl-6.30.223.141-20.mga3.nonfree - 3/nonfree/kmod-fglrx-13.251-10.mga3.nonfree - 3/nonfree/kmod-nvidia173-173.14.38-35.mga3.nonfree - 3/nonfree/kmod-nvidia304-304.108-20.mga3.nonfree - 3/nonfree/kmod-nvidia-current-319.60-20.mga3.nonfree