[RHSA-2014:1971] kernel security and bug fix update

Severity Important
Affected Packages 32
CVEs 18
  • A flaw was found in the way the Linux kernel's SCTP implementation
    handled malformed or duplicate Address Configuration Change Chunks
    (ASCONF). A remote attacker could use either of these flaws to crash the
    system. (CVE-2014-3673, CVE-2014-3687, Important)

  • A flaw was found in the way the Linux kernel's SCTP implementation
    handled the association's output queue. A remote attacker could send
    specially crafted packets that would cause the system to use an excessive
    amount of memory, leading to a denial of service. (CVE-2014-3688,
    Important)

  • Two flaws were found in the way the Apple Magic Mouse/Trackpad
    multi-touch driver and the Minibox PicoLCD driver handled invalid HID
    reports. An attacker with physical access to the system could use these
    flaws to crash the system or, potentially, escalate their privileges on the
    system. (CVE-2014-3181, CVE-2014-3186, Moderate)

  • A memory corruption flaw was found in the way the USB ConnectTech
    WhiteHEAT serial driver processed completion commands sent via USB Request
    Blocks buffers. An attacker with physical access to the system could use
    this flaw to crash the system or, potentially, escalate their privileges on
    the system. (CVE-2014-3185, Moderate)

  • A flaw was found in the way the Linux kernel's keys subsystem handled the
    termination condition in the associative array garbage collection
    functionality. A local, unprivileged user could use this flaw to crash the
    system. (CVE-2014-3631, Moderate)

  • Multiple flaws were found in the way the Linux kernel's ALSA
    implementation handled user controls. A local, privileged user could use
    either of these flaws to crash the system. (CVE-2014-4654, CVE-2014-4655,
    CVE-2014-4656, Moderate)

  • A flaw was found in the way the Linux kernel's VFS subsystem handled
    reference counting when performing unmount operations on symbolic links.
    A local, unprivileged user could use this flaw to exhaust all available
    memory on the system or, potentially, trigger a use-after-free error,
    resulting in a system crash or privilege escalation. (CVE-2014-5045,
    Moderate)

  • A flaw was found in the way the get_dumpable() function return value was
    interpreted in the ptrace subsystem of the Linux kernel. When
    'fs.suid_dumpable' was set to 2, a local, unprivileged local user could
    use this flaw to bypass intended ptrace restrictions and obtain
    potentially sensitive information. (CVE-2013-2929, Low)

  • A stack overflow flaw caused by infinite recursion was found in the way
    the Linux kernel's UDF file system implementation processed indirect ICBs.
    An attacker with physical access to the system could use a specially
    crafted UDF image to crash the system. (CVE-2014-6410, Low)

  • An information leak flaw in the way the Linux kernel handled media device
    enumerate entities IOCTL requests could allow a local user able to access
    the /dev/media0 device file to leak kernel memory bytes. (CVE-2014-1739,
    Low)

  • An out-of-bounds read flaw in the Logitech Unifying receiver driver could
    allow an attacker with physical access to the system to crash the system
    or, potentially, escalate their privileges on the system. (CVE-2014-3182,
    Low)

  • Multiple out-of-bounds write flaws were found in the way the Cherry
    Cymotion keyboard driver, KYE/Genius device drivers, Logitech device
    drivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote
    control driver, and Sunplus wireless desktop driver handled invalid HID
    reports. An attacker with physical access to the system could use either of
    these flaws to write data past an allocated memory buffer. (CVE-2014-3184,
    Low)

  • An information leak flaw was found in the RAM Disks Memory Copy (rd_mcp)
    back end driver of the iSCSI Target subsystem could allow a privileged user
    to leak the contents of kernel memory to an iSCSI initiator remote client.
    (CVE-2014-4027, Low)

  • An information leak flaw in the Linux kernel's ALSA implementation could
    allow a local, privileged user to leak kernel memory to user space.
    (CVE-2014-4652, Low)

Package Affected Version
pkg:rpm/redhat/python-perf?arch=x86_64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/python-perf?arch=s390x&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/python-perf?arch=ppc64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/perf?arch=s390x&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/perf?arch=ppc64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel?arch=ppc64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-tools?arch=x86_64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-tools?arch=ppc64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-tools-libs?arch=x86_64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-tools-libs?arch=ppc64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-tools-libs-devel?arch=x86_64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-kdump?arch=s390x&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-kdump-devel?arch=s390x&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-headers?arch=ppc64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-doc?distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-devel?arch=ppc64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-debug?arch=ppc64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-debug-devel?arch=ppc64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64&distro=redhat-7 < 3.10.0-123.13.1.el7
pkg:rpm/redhat/kernel-abi-whitelists?distro=redhat-7 < 3.10.0-123.13.1.el7
ID
RHSA-2014:1971
Severity
important
URL
https://access.redhat.com/errata/RHSA-2014:1971
Published
2014-12-09T00:00:00
(9 years ago)
Modified
2014-12-09T00:00:00
(9 years ago)
Rights
Copyright 2014 Red Hat, Inc.
Other Advisories
Source # ID Name URL
Bugzilla 1028148 https://bugzilla.redhat.com/1028148
Bugzilla 1108744 https://bugzilla.redhat.com/1108744
Bugzilla 1109774 https://bugzilla.redhat.com/1109774
Bugzilla 1113406 https://bugzilla.redhat.com/1113406
Bugzilla 1113445 https://bugzilla.redhat.com/1113445
Bugzilla 1113470 https://bugzilla.redhat.com/1113470
Bugzilla 1122472 https://bugzilla.redhat.com/1122472
Bugzilla 1140325 https://bugzilla.redhat.com/1140325
Bugzilla 1141173 https://bugzilla.redhat.com/1141173
Bugzilla 1141210 https://bugzilla.redhat.com/1141210
Bugzilla 1141391 https://bugzilla.redhat.com/1141391
Bugzilla 1141400 https://bugzilla.redhat.com/1141400
Bugzilla 1141407 https://bugzilla.redhat.com/1141407
Bugzilla 1141809 https://bugzilla.redhat.com/1141809
Bugzilla 1147850 https://bugzilla.redhat.com/1147850
Bugzilla 1155731 https://bugzilla.redhat.com/1155731
Bugzilla 1155745 https://bugzilla.redhat.com/1155745
RHSA RHSA-2014:1971 https://access.redhat.com/errata/RHSA-2014:1971
CVE CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2013-2929
CVE CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-1739
CVE CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3181
CVE CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3182
CVE CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3184
CVE CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3185
CVE CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3186
CVE CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3631
CVE CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3673
CVE CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3687
CVE CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-3688
CVE CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4027
CVE CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4652
CVE CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4654
CVE CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4655
CVE CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-4656
CVE CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-5045
CVE CVE-2014-6410 https://access.redhat.com/security/cve/CVE-2014-6410
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/python-perf?arch=x86_64&distro=redhat-7 redhat python-perf < 3.10.0-123.13.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/python-perf?arch=s390x&distro=redhat-7 redhat python-perf < 3.10.0-123.13.1.el7 redhat-7 s390x
Affected pkg:rpm/redhat/python-perf?arch=ppc64&distro=redhat-7 redhat python-perf < 3.10.0-123.13.1.el7 redhat-7 ppc64
Affected pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-7 redhat perf < 3.10.0-123.13.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/perf?arch=s390x&distro=redhat-7 redhat perf < 3.10.0-123.13.1.el7 redhat-7 s390x
Affected pkg:rpm/redhat/perf?arch=ppc64&distro=redhat-7 redhat perf < 3.10.0-123.13.1.el7 redhat-7 ppc64
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 redhat kernel < 3.10.0-123.13.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-7 redhat kernel < 3.10.0-123.13.1.el7 redhat-7 s390x
Affected pkg:rpm/redhat/kernel?arch=ppc64&distro=redhat-7 redhat kernel < 3.10.0-123.13.1.el7 redhat-7 ppc64
Affected pkg:rpm/redhat/kernel-tools?arch=x86_64&distro=redhat-7 redhat kernel-tools < 3.10.0-123.13.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel-tools?arch=ppc64&distro=redhat-7 redhat kernel-tools < 3.10.0-123.13.1.el7 redhat-7 ppc64
Affected pkg:rpm/redhat/kernel-tools-libs?arch=x86_64&distro=redhat-7 redhat kernel-tools-libs < 3.10.0-123.13.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel-tools-libs?arch=ppc64&distro=redhat-7 redhat kernel-tools-libs < 3.10.0-123.13.1.el7 redhat-7 ppc64
Affected pkg:rpm/redhat/kernel-tools-libs-devel?arch=x86_64&distro=redhat-7 redhat kernel-tools-libs-devel < 3.10.0-123.13.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64&distro=redhat-7 redhat kernel-tools-libs-devel < 3.10.0-123.13.1.el7 redhat-7 ppc64
Affected pkg:rpm/redhat/kernel-kdump?arch=s390x&distro=redhat-7 redhat kernel-kdump < 3.10.0-123.13.1.el7 redhat-7 s390x
Affected pkg:rpm/redhat/kernel-kdump-devel?arch=s390x&distro=redhat-7 redhat kernel-kdump-devel < 3.10.0-123.13.1.el7 redhat-7 s390x
Affected pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-7 redhat kernel-headers < 3.10.0-123.13.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-7 redhat kernel-headers < 3.10.0-123.13.1.el7 redhat-7 s390x
Affected pkg:rpm/redhat/kernel-headers?arch=ppc64&distro=redhat-7 redhat kernel-headers < 3.10.0-123.13.1.el7 redhat-7 ppc64
Affected pkg:rpm/redhat/kernel-doc?distro=redhat-7 redhat kernel-doc < 3.10.0-123.13.1.el7 redhat-7
Affected pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-7 redhat kernel-devel < 3.10.0-123.13.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-7 redhat kernel-devel < 3.10.0-123.13.1.el7 redhat-7 s390x
Affected pkg:rpm/redhat/kernel-devel?arch=ppc64&distro=redhat-7 redhat kernel-devel < 3.10.0-123.13.1.el7 redhat-7 ppc64
Affected pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-7 redhat kernel-debug < 3.10.0-123.13.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-7 redhat kernel-debug < 3.10.0-123.13.1.el7 redhat-7 s390x
Affected pkg:rpm/redhat/kernel-debug?arch=ppc64&distro=redhat-7 redhat kernel-debug < 3.10.0-123.13.1.el7 redhat-7 ppc64
Affected pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-7 redhat kernel-debug-devel < 3.10.0-123.13.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-7 redhat kernel-debug-devel < 3.10.0-123.13.1.el7 redhat-7 s390x
Affected pkg:rpm/redhat/kernel-debug-devel?arch=ppc64&distro=redhat-7 redhat kernel-debug-devel < 3.10.0-123.13.1.el7 redhat-7 ppc64
Affected pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64&distro=redhat-7 redhat kernel-bootwrapper < 3.10.0-123.13.1.el7 redhat-7 ppc64
Affected pkg:rpm/redhat/kernel-abi-whitelists?distro=redhat-7 redhat kernel-abi-whitelists < 3.10.0-123.13.1.el7 redhat-7
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...