First published: Tue Feb 11 2014(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br><li> A buffer overflow flaw was found in the way the qeth_snmp_command()</li> function in the Linux kernel's QETH network device driver implementation<br>handled SNMP IOCTL requests with an out-of-bounds length. A local,<br>unprivileged user could use this flaw to crash the system or, potentially,<br>escalate their privileges on the system. (CVE-2013-6381, Important)<br><li> A flaw was found in the way the get_dumpable() function return value was</li> interpreted in the ptrace subsystem of the Linux kernel. When<br>'fs.suid_dumpable' was set to 2, a local, unprivileged local user could<br>use this flaw to bypass intended ptrace restrictions and obtain<br>potentially sensitive information. (CVE-2013-2929, Low)<br><li> It was found that certain protocol handlers in the Linux kernel's</li> networking implementation could set the addr_len value without initializing<br>the associated data structure. A local, unprivileged user could use this<br>flaw to leak kernel stack memory to user space using the recvmsg, recvfrom,<br>and recvmmsg system calls (CVE-2013-7263, CVE-2013-7265, Low).<br>This update also fixes several bugs. Documentation for these changes will<br>be available shortly from the Technical Notes document linked to in the<br>References section.<br>All kernel users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. The system must be<br>rebooted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-abi-whitelists | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-debug | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-debug-devel | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-debuginfo | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-devel | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-doc | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-firmware | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-headers | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/perf | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/perf-debuginfo | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/python-perf | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-debug | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-debug-devel | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-debuginfo | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-devel | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-headers | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/perf | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/perf-debuginfo | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/python-perf | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-kdump | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-kdump-devel | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-bootwrapper | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-431.5.1.el6 | 2.6.32-431.5.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.