CWE
362
Advisory Published

RHSA-2014:1318: Moderate: Red Hat Enterprise MRG Realtime 2.5 security and enhancement update

First published: Mon Sep 29 2014(Updated: )

Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation<br>IT infrastructure for enterprise computing. MRG offers increased<br>performance, reliability, interoperability, and faster computing for<br>enterprise customers.<br>MRG Realtime provides the highest levels of predictability for consistent<br>low-latency response times to meet the needs of time-sensitive workloads.<br>MRG Realtime also provides new levels of determinism by optimizing lengthy<br>kernel code paths to ensure that they do not become bottlenecks. This<br>allows for better prioritization of applications, resulting in consistent,<br>predictable response times for high-priority applications.<br><li> An out-of-bounds write flaw was found in the way the Apple Magic</li> Mouse/Trackpad multi-touch driver handled Human Interface Device (HID)<br>reports with an invalid size. An attacker with physical access to the<br>system could use this flaw to crash the system or, potentially, escalate<br>their privileges on the system. (CVE-2014-3181, Moderate)<br><li> A memory corruption flaw was found in the way the USB ConnectTech</li> WhiteHEAT serial driver processed completion commands sent via USB Request<br>Blocks buffers. An attacker with physical access to the system could use<br>this flaw to crash the system or, potentially, escalate their privileges on<br>the system. (CVE-2014-3185, Moderate)<br><li> A race condition flaw was found in the way the Linux kernel's mmap(2),</li> madvise(2), and fallocate(2) system calls interacted with each other while<br>operating on virtual memory file system files. A local user could use this<br>flaw to cause a denial of service. (CVE-2014-4171, Moderate)<br><li> A stack overflow flaw caused by infinite recursion was found in the way</li> the Linux kernel's Universal Disk Format (UDF) file system implementation<br>processed indirect Information Control Blocks (ICBs). An attacker with<br>physical access to the system could use a specially crafted UDF image to<br>crash the system. (CVE-2014-6410, Low)<br><li> An out-of-bounds read flaw was found in the way the Logitech Unifying</li> receiver driver handled HID reports with an invalid device_index value.<br>An attacker with physical access to the system could use this flaw to crash<br>the system or, potentially, escalate their privileges on the system.<br>(CVE-2014-3182, Low)<br><li> Multiple out-of-bounds write flaws were found in the way the Cherry</li> Cymotion keyboard driver, KYE/Genius device drivers, Logitech device<br>drivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote<br>control driver, and Sunplus wireless desktop driver handled HID reports<br>with an invalid report descriptor size. An attacker with physical access to<br>the system could use either of these flaws to write data past an allocated<br>memory buffer. (CVE-2014-3184, Low)<br><li> It was found that the parse_rock_ridge_inode_internal() function of the</li> Linux kernel's ISOFS implementation did not correctly check relocated<br>directories when processing Rock Ridge child link (CL) tags. An attacker<br>with physical access to the system could use a specially crafted ISO image<br>to crash the system or, potentially, escalate their privileges on the<br>system. (CVE-2014-5471, CVE-2014-5472, Low)<br>This update also adds the following enhancement:<br><li> The Solarflare SFC9120 10GBE Ethernet NICs were not supported by the MRG</li> Realtime kernel. With this update, the drivers have been updated to enable<br>the Solarflare SFC9120 cards on the Realtime kernel. (BZ#1086945)<br>All Red Hat Enterprise MRG Realtime users are advised to upgrade to these<br>updated packages, which contain backported patches to correct these issues<br>and add this enhancement.<br>

Affected SoftwareAffected VersionHow to fix
redhat/kernel-rt<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-debug<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-debug-debuginfo<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-debug-devel<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-debuginfo<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-devel<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-doc<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-firmware<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-trace<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-trace-debuginfo<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-trace-devel<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-vanilla<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-vanilla-debuginfo<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6
redhat/kernel-rt-vanilla-devel<3.10.33-rt32.51.el6
3.10.33-rt32.51.el6

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203