[Ksplice-el7-updates] New updates available via Ksplice (RHSA-2014:1724)
Oracle Ksplice
ksplice-support_ww at oracle.com
Thu Oct 30 03:22:15 PDT 2014
Synopsis: RHSA-2014:1724 can now be patched using Ksplice
CVEs: CVE-2014-3611 CVE-2014-3645 CVE-2014-3646 CVE-2014-4653 CVE-2014-5077
Systems running Red Hat Enterprise Linux 7 can now use Ksplice to
patch against the latest Red Hat Security Advisory, RHSA-2014:1724.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on RHEL 7 install these
updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2014-5077: Remote denial-of-service in SCTP on simultaneous connections.
Linux kernel built with the support for Stream Control Transmission
Protocol is vulnerable to a NULL pointer dereference flaw. It could occur
when simultaneous new connections are initiated between the same pair of
hosts. A remote user/program could use this flaw to crash the system kernel
resulting in denial-of-service.
* Filesystem corruption during block bitmap verification in Ext4 filesystem.
If a filesystem is mounted with the 'errors=continue' option, the code
responsible for doing block bitmap verification will happily accept a
corrupted bitmap. The block allocator may subsequently use the corrupt
bitmap to reuse blocks covered by the bitmap, corrupting the data in
those blocks.
* CVE-2014-4653: Use after free in ALSA card controls.
Missing synchronization in ALSA card controls could lead to a control
being freed while being in use.
* CVE-2014-3611: Denial-of-service in KVM emulated programmable interval timer.
Incorrect locking in the KVM emulated programmable interval timer (PIT)
could crash the host kernel under specific conditions. A local attacker
could use this flaw to cause a denial-of-service in the host KVM.
* Use-after-free in process group scheduling when creating group.
Due to the way new groups are initialised, it is possible for another
thread to see a partially initialised group. This could lead to a
use-after-free error and a subsequent kernel crash.
* CVE-2014-3645 and CVE-2014-3646: KVM guest denial-of-service when using invalid opcodes.
The KVM host emulator does not gracefully handle a KVM guest using the
invept or invvpid opcodes, causing a guest VM exit without proper error
codes being propagated to userspace. A local, unprivileged guest user
could use this flaw to crash a KVM guest VM and cause a denial-of-service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-el7-updates
mailing list