First published: Tue Jan 20 2015(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br><li> A flaw was found in the way the Linux kernel's SCTP implementation</li> handled malformed or duplicate Address Configuration Change Chunks<br>(ASCONF). A remote attacker could use either of these flaws to crash the<br>system. (CVE-2014-3673, CVE-2014-3687, Important)<br><li> A flaw was found in the way the Linux kernel's SCTP implementation</li> handled the association's output queue. A remote attacker could send<br>specially crafted packets that would cause the system to use an excessive<br>amount of memory, leading to a denial of service. (CVE-2014-3688,<br>Important)<br><li> A flaw was found in the way the Linux kernel's VFS subsystem handled</li> reference counting when performing unmount operations on symbolic links.<br>A local, unprivileged user could use this flaw to exhaust all available<br>memory on the system or, potentially, trigger a use-after-free error,<br>resulting in a system crash or privilege escalation. (CVE-2014-5045,<br>Moderate)<br><li> An integer overflow flaw was found in the way the lzo1x_decompress_safe()</li> function of the Linux kernel's LZO implementation processed Literal Runs.<br>A local attacker could, in extremely rare cases, use this flaw to crash the<br>system or, potentially, escalate their privileges on the system.<br>(CVE-2014-4608, Low)<br>Red Hat would like to thank Vasily Averin of Parallels for reporting<br>CVE-2014-5045, and Don A. Bailey from Lab Mouse Security for reporting<br>CVE-2014-4608. The CVE-2014-3673 issue was discovered by Liu Wei of<br>Red Hat.<br>This update also fixes several bugs and adds one enhancement.<br>Documentation for these changes is available from the Technical Notes<br>document linked to in the References section.<br>All kernel users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues and add this<br>enhancement. The system must be rebooted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-abi-whitelists | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-debug | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-debug-devel | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-debuginfo | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-devel | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-doc | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-firmware | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-headers | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/perf | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/perf-debuginfo | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/python-perf | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/python-perf-debuginfo | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-debug | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-debug-devel | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-debuginfo | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-devel | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-headers | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/perf | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/perf-debuginfo | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/python-perf | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/python-perf-debuginfo | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-kdump | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-kdump-devel | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-bootwrapper | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-431.46.2.el6 | 2.6.32-431.46.2.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.