Updated kernel packages fix security vulnerabilities
Publication date: 05 Aug 2014Modification date: 05 Aug 2014
Type: security
Affected Mageia releases : 3
CVE: CVE-2014-0206 , CVE-2014-4171 , CVE-2014-4508 , CVE-2014-5077
Description
This kernel update provides the upstream 3.10.50 longterm kernel and
fixes the following security issues:
Array index error in the aio_read_events_ring function in fs/aio.c in
the Linux kernel through 3.15.1 allows local users to obtain sensitive
information from kernel memory via a large head value (CVE-2014-0206).
mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement
the interaction between range notification and hole punching, which allows
local users to cause a denial of service (i_mutex hold) by using the mmap
system call to access a hole, as demonstrated by interfering with intended
shmem activity by blocking completion of (1) an MADV_REMOVE madvise call
or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (CVE-2014-4171).
arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit
x86 platforms, when syscall auditing is enabled and the sep CPU feature
flag is set, allows local users to cause a denial of service (OOPS and
system crash) via an invalid syscall number, as demonstrated by number
1000 (CVE-2014-4508).
Linux kernel built with the support for Stream Control Transmission
Protocol (CONFIG_IP_SCTP) is vulnerable to a NULL pointer dereference
flaw. It could occur when simultaneous new connections are initiated
between a same pair of hosts. A remote user/program could use this
flaw to crash the system kernel resulting in DoS (CVE-2014-5077).
References
- https://bugs.mageia.org/show_bug.cgi?id=13802
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.45
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.46
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.48
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.49
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.50
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077
SRPMS
3/core
- kernel-3.10.50-1.mga3
- kernel-userspace-headers-3.10.50-1.mga3
- kmod-vboxadditions-4.3.10-10.mga3
- kmod-virtualbox-4.3.10-10.mga3
- kmod-xtables-addons-2.3-20.mga3
3/nonfree
- kmod-broadcom-wl-6.30.223.141-20.mga3.nonfree
- kmod-fglrx-13.251-10.mga3.nonfree
- kmod-nvidia173-173.14.38-35.mga3.nonfree
- kmod-nvidia304-304.108-20.mga3.nonfree
- kmod-nvidia-current-319.60-20.mga3.nonfree