First published: Tue Mar 25 2014(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br><li> A flaw was found in the way the get_rx_bufs() function in the vhost_net</li> implementation in the Linux kernel handled error conditions reported by the<br>vhost_get_vq_desc() function. A privileged guest user could use this flaw<br>to crash the host. (CVE-2014-0055, Important)<br><li> A flaw was found in the way the Linux kernel processed an authenticated</li> COOKIE_ECHO chunk during the initialization of an SCTP connection. A remote<br>attacker could use this flaw to crash the system by initiating a specially<br>crafted SCTP handshake in order to trigger a NULL pointer dereference on<br>the system. (CVE-2014-0101, Important)<br><li> A flaw was found in the way the Linux kernel's CIFS implementation</li> handled uncached write operations with specially crafted iovec structures.<br>An unprivileged local user with access to a CIFS share could use this flaw<br>to crash the system, leak kernel memory, or, potentially, escalate their<br>privileges on the system. Note: the default cache settings for CIFS mounts<br>on Red Hat Enterprise Linux 6 prohibit a successful exploitation of this<br>issue. (CVE-2014-0069, Moderate)<br><li> A heap-based buffer overflow flaw was found in the Linux kernel's cdc-wdm</li> driver, used for USB CDC WCM device management. An attacker with physical<br>access to a system could use this flaw to cause a denial of service or,<br>potentially, escalate their privileges. (CVE-2013-1860, Low)<br>Red Hat would like to thank Nokia Siemens Networks for reporting<br>CVE-2014-0101, and Al Viro for reporting CVE-2014-0069.<br>This update also fixes several bugs. Documentation for these changes will<br>be available shortly from the Technical Notes document linked to in the<br>References section.<br>All kernel users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. The system must be<br>rebooted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-abi-whitelists | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-debug | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-debug-devel | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-debuginfo | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-devel | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-doc | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-firmware | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-headers | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/perf | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/perf-debuginfo | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/python-perf | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/python-perf-debuginfo | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-debug | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-debug-devel | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-debuginfo | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-devel | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-headers | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/perf | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/perf-debuginfo | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/python-perf | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/python-perf-debuginfo | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-kdump | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-kdump-devel | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-bootwrapper | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-431.11.2.el6 | 2.6.32-431.11.2.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.