First published: Wed Jul 23 2014(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br><li> It was found that the Linux kernel's ptrace subsystem allowed a traced</li> process' instruction pointer to be set to a non-canonical memory address<br>without forcing the non-sysret code path when returning to user space.<br>A local, unprivileged user could use this flaw to crash the system or,<br>potentially, escalate their privileges on the system. (CVE-2014-4699,<br>Important)<br>Note: The CVE-2014-4699 issue only affected systems using an Intel CPU.<br><li> A flaw was found in the way the pppol2tp_setsockopt() and</li> pppol2tp_getsockopt() functions in the Linux kernel's PPP over L2TP<br>implementation handled requests with a non-SOL_PPPOL2TP socket option<br>level. A local, unprivileged user could use this flaw to escalate their<br>privileges on the system. (CVE-2014-4943, Important)<br>Red Hat would like to thank Andy Lutomirski for reporting CVE-2014-4699,<br>and Sasha Levin for reporting CVE-2014-4943.<br>All kernel users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. The system must be<br>rebooted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-abi-whitelists | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-debug | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-debug-devel | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-debuginfo | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-devel | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-doc | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-firmware | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-headers | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/perf | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/perf-debuginfo | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/python-perf | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/python-perf-debuginfo | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-debug | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-debug-devel | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-debuginfo | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-devel | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-headers | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/perf | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/perf-debuginfo | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/python-perf | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/python-perf-debuginfo | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-kdump | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-kdump-devel | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-bootwrapper | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-431.20.5.el6 | 2.6.32-431.20.5.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.