Advisories ยป MGASA-2014-0318

Updated kernel packages fix security vulnerabilities

Publication date: 05 Aug 2014
Modification date: 05 Aug 2014
Type: security
Affected Mageia releases : 3
CVE: CVE-2014-0206 , CVE-2014-4171 , CVE-2014-4508 , CVE-2014-5077

Description

This kernel update provides the upstream 3.10.50 longterm kernel and
fixes the following security issues:

Array index error in the aio_read_events_ring function in fs/aio.c in
the Linux kernel through 3.15.1 allows local users to obtain sensitive
information from kernel memory via a large head value (CVE-2014-0206).

mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement
the interaction between range notification and hole punching, which allows
local users to cause a denial of service (i_mutex hold) by using the mmap
system call to access a hole, as demonstrated by interfering with intended
shmem activity by blocking completion of (1) an MADV_REMOVE madvise call
or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (CVE-2014-4171).

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit
x86 platforms, when syscall auditing is enabled and the sep CPU feature
flag is set, allows local users to cause a denial of service (OOPS and
system crash) via an invalid syscall number, as demonstrated by number
1000 (CVE-2014-4508). 

Linux kernel built with the support for Stream Control Transmission
Protocol (CONFIG_IP_SCTP) is vulnerable to a NULL pointer dereference
flaw. It could occur when simultaneous new connections are initiated
between a same pair of hosts. A remote user/program could use this
flaw to crash the system kernel resulting in DoS (CVE-2014-5077).
                

References

SRPMS

3/nonfree

3/core