First published: Thu Oct 30 2014(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br><li> A flaw was found in the way the Linux kernel's futex subsystem handled</li> reference counting when requeuing futexes during futex_wait(). A local,<br>unprivileged user could use this flaw to zero out the reference counter of<br>an inode or an mm struct that backs up the memory area of the futex, which<br>could lead to a use-after-free flaw, resulting in a system crash or,<br>potentially, privilege escalation. (CVE-2014-0205)<br><li> A NULL pointer dereference flaw was found in the way the Linux kernel's</li> Stream Control Transmission Protocol (SCTP) implementation handled<br>simultaneous connections between the same hosts. A remote attacker could<br>use this flaw to crash the system. (CVE-2014-5077)<br>The security impact of the CVE-2014-0205 issue was discovered by Mateusz<br>Guzik of Red Hat.<br>All kernel users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. The system must be<br>rebooted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/kernel | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/kernel-debug | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/kernel-debug-devel | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/kernel-debuginfo | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/kernel-devel | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/kernel-doc | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/kernel-firmware | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/kernel-headers | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/perf | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/perf-debuginfo | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/python-perf | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-220.56.1.el6 | 2.6.32-220.56.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2014:1763 is classified as important.
To fix RHSA-2014:1763, update the kernel packages to version 2.6.32-220.56.1.el6 or later.
The affected kernel packages by RHSA-2014:1763 include kernel, kernel-debug, kernel-devel, and others listed in the advisory.
Yes, a local unprivileged user could potentially exploit RHSA-2014:1763 due to a flaw in the futex subsystem.
RHSA-2014:1763 impacts systems running Red Hat Enterprise Linux 6 with specific kernel versions below 2.6.32-220.56.1.el6.