|
|
Subscribe / Log in / New account

Mageia alert MGASA-2014-0474 (kernel)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2014-0474: Updated kernel packages fix security vulnerabilities
Date:  Fri, 21 Nov 2014 13:44:56 +0100
Message-ID:  <20141121124456.2BBC35D7A9@valstar.mageia.org>

MGASA-2014-0474 - Updated kernel packages fix security vulnerabilities Publication date: 21 Nov 2014 URL: http://advisories.mageia.org/MGASA-2014-0474.html Type: security Affected Mageia releases: 4 CVE: CVE-2014-3610, CVE-2014-3611, CVE-2014-3646, CVE-2014-3647 Description: This kernel update is based on upstream -longterm 3.14.24 and fixes the following security issues: The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non- canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c (CVE-2014-3610). Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation (CVE-2014-3611). arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application (CVE-2014-3646). arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application (CVE-2014-3647). Other changes: Revert "drivers/net: Disable UFO through virtio" as it breaks VM migration add ahci support for Intel Sunrise Point / Skylake make INTEL_MEI modular (mga#14469) For other upstream changes, read the referenced changelog. References: - https://bugs.mageia.org/show_bug.cgi?id=14570 - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3611 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647 SRPMS: - 4/core/kernel-3.14.24-1.mga4 - 4/core/kernel-userspace-headers-3.14.24-1.mga4 - 4/core/kmod-vboxadditions-4.3.18-4.mga4 - 4/core/kmod-virtualbox-4.3.18-4.mga4 - 4/core/kmod-xtables-addons-2.5-7.mga4 - 4/nonfree/kmod-broadcom-wl-6.30.223.141-42.mga4.nonfree - 4/nonfree/kmod-fglrx-14.010.1006-12.mga4.nonfree - 4/nonfree/kmod-nvidia173-173.14.39-27.mga4.nonfree - 4/nonfree/kmod-nvidia304-304.121-7.mga4.nonfree - 4/nonfree/kmod-nvidia-current-331.79-12.mga4.nonfree


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds