First published: Tue Oct 14 2014(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br><li> A NULL pointer dereference flaw was found in the way the Linux kernel's</li> Stream Control Transmission Protocol (SCTP) implementation handled<br>simultaneous connections between the same hosts. A remote attacker could<br>use this flaw to crash the system. (CVE-2014-5077, Important)<br><li> An integer overflow flaw was found in the way the Linux kernel's Frame</li> Buffer device implementation mapped kernel memory to user space via the<br>mmap syscall. A local user able to access a frame buffer device file<br>(/dev/fb*) could possibly use this flaw to escalate their privileges on the<br>system. (CVE-2013-2596, Important)<br><li> A flaw was found in the way the ipc_rcu_putref() function in the Linux</li> kernel's IPC implementation handled reference counter decrementing.<br>A local, unprivileged user could use this flaw to trigger an Out of Memory<br>(OOM) condition and, potentially, crash the system. (CVE-2013-4483,<br>Moderate)<br><li> It was found that the permission checks performed by the Linux kernel</li> when a netlink message was received were not sufficient. A local,<br>unprivileged user could potentially bypass these restrictions by passing a<br>netlink socket as stdout or stderr to a more privileged process and<br>altering the output of this process. (CVE-2014-0181, Moderate)<br><li> It was found that the try_to_unmap_cluster() function in the Linux</li> kernel's Memory Managment subsystem did not properly handle page locking in<br>certain cases, which could potentially trigger the BUG_ON() macro in the<br>mlock_vma_page() function. A local, unprivileged user could use this flaw<br>to crash the system. (CVE-2014-3122, Moderate)<br><li> A flaw was found in the way the Linux kernel's kvm_iommu_map_pages()</li> function handled IOMMU mapping failures. A privileged user in a guest with<br>an assigned host device could use this flaw to crash the host.<br>(CVE-2014-3601, Moderate)<br><li> Multiple use-after-free flaws were found in the way the Linux kernel's</li> Advanced Linux Sound Architecture (ALSA) implementation handled user<br>controls. A local, privileged user could use either of these flaws to crash<br>the system. (CVE-2014-4653, CVE-2014-4654, CVE-2014-4655, Moderate)<br><li> A flaw was found in the way the Linux kernel's VFS subsystem handled</li> reference counting when performing unmount operations on symbolic links.<br>A local, unprivileged user could use this flaw to exhaust all available<br>memory on the system or, potentially, trigger a use-after-free error,<br>resulting in a system crash or privilege escalation. (CVE-2014-5045,<br>Moderate)<br><li> An integer overflow flaw was found in the way the lzo1x_decompress_safe()</li> function of the Linux kernel's LZO implementation processed Literal Runs.<br>A local attacker could, in extremely rare cases, use this flaw to crash the<br>system or, potentially, escalate their privileges on the system.<br>(CVE-2014-4608, Low)<br>Red Hat would like to thank Vladimir Davydov of Parallels for reporting<br>CVE-2013-4483, Jack Morgenstein of Mellanox for reporting CVE-2014-3601,<br>Vasily Averin of Parallels for reporting CVE-2014-5045, and Don A.<br>Bailey from Lab Mouse Security for reporting CVE-2014-4608. The security<br>impact of the CVE-2014-3601 issue was discovered by Michael Tsirkin of<br>Red Hat.<br>This update also fixes several hundred bugs and adds numerous enhancements.<br>Refer to the Red Hat Enterprise Linux 6.6 Release Notes for information on<br>the most significant of these changes, and the Technical Notes for further<br>information, both linked to in the References.<br>All Red Hat Enterprise Linux 6 users are advised to install these updated<br>packages, which correct these issues, and fix the bugs and add the<br>enhancements noted in the Red Hat Enterprise Linux 6.6 Release Notes and<br>Technical Notes. The system must be rebooted for this update to<br>take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-abi-whitelists | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-debug | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-debug-devel | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-debuginfo | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-devel | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-doc | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-firmware | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-headers | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/perf | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/perf-debuginfo | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/python-perf | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/python-perf-debuginfo | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-debug | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-debug-devel | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-debuginfo | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-devel | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-headers | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/perf | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/perf-debuginfo | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/python-perf | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/python-perf-debuginfo | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-kdump | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-kdump-devel | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-bootwrapper | <2.6.32-504.el6 | 2.6.32-504.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-504.el6 | 2.6.32-504.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.