Updated kernel packages fix security vulnerabilities
Publication date: 05 Aug 2014Modification date: 05 Aug 2014
Type: security
Affected Mageia releases : 3
CVE: CVE-2014-0206 , CVE-2014-4171 , CVE-2014-4508 , CVE-2014-5077
Description
This kernel update provides the upstream 3.10.50 longterm kernel and fixes the following security issues: Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value (CVE-2014-0206). mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (CVE-2014-4171). arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000 (CVE-2014-4508). Linux kernel built with the support for Stream Control Transmission Protocol (CONFIG_IP_SCTP) is vulnerable to a NULL pointer dereference flaw. It could occur when simultaneous new connections are initiated between a same pair of hosts. A remote user/program could use this flaw to crash the system kernel resulting in DoS (CVE-2014-5077).
References
- https://bugs.mageia.org/show_bug.cgi?id=13802
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.45
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.46
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.48
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.49
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.50
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077
SRPMS
3/nonfree
- kmod-broadcom-wl-6.30.223.141-20.mga3.nonfree
- kmod-fglrx-13.251-10.mga3.nonfree
- kmod-nvidia173-173.14.38-35.mga3.nonfree
- kmod-nvidia304-304.108-20.mga3.nonfree
- kmod-nvidia-current-319.60-20.mga3.nonfree
3/core
- kernel-3.10.50-1.mga3
- kernel-userspace-headers-3.10.50-1.mga3
- kmod-vboxadditions-4.3.10-10.mga3
- kmod-virtualbox-4.3.10-10.mga3
- kmod-xtables-addons-2.3-20.mga3