Debian: DSA-3060-1: linux security update

    Date31 Oct 2014
    CategoryDebian
    44
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service: CVE-2014-3610
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3060-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                      Salvatore Bonaccorso
    October 31, 2014                       http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : linux
    CVE ID         : CVE-2014-3610 CVE-2014-3611 CVE-2014-3645 CVE-2014-3646 
                     CVE-2014-3647 CVE-2014-3673 CVE-2014-3687 CVE-2014-3688
                     CVE-2014-3690 CVE-2014-7207
    Debian Bug     : 766195
    
    Several vulnerabilities have been discovered in the Linux kernel that
    may lead to a denial of service:
    
    CVE-2014-3610
    
        Lars Bull of Google and Nadav Amit reported a flaw in how KVM
        handles noncanonical writes to certain MSR registers. A privileged
        guest user can exploit this flaw to cause a denial of service
        (kernel panic) on the host.
    
    CVE-2014-3611
    
        Lars Bull of Google reported a race condition in in the PIT
        emulation code in KVM. A local guest user with access to PIT i/o
        ports could exploit this flaw to cause a denial of service (crash)
        on the host.
    
    CVE-2014-3645 / CVE-2014-3646
    
        The Advanced Threat Research team at Intel Security discovered
        that the KVM subsystem did not handle the VM exits gracefully
        for the invept (Invalidate Translations Derived from EPT) and
        invvpid (Invalidate Translations Based on VPID) instructions. On
        hosts with an Intel processor and invept/invppid VM exit
        support, an unprivileged guest user could use these instructions
        to crash the guest.
    
    CVE-2014-3647
    
        Nadav Amit reported that KVM mishandles noncanonical addresses when
        emulating instructions that change rip, potentially causing a failed
        VM-entry. A guest user with access to I/O or the MMIO can use this
        flaw to cause a denial of service (system crash) of the guest.
    
    CVE-2014-3673
    
        Liu Wei of Red Hat discovered a flaw in net/core/skbuff.c leading to
        a kernel panic when receiving malformed ASCONF chunks. A remote
        attacker could use this flaw to crash the system.
    
    CVE-2014-3687
    
        A flaw in the sctp stack was discovered leading to a kernel panic
        when receiving duplicate ASCONF chunks. A remote attacker could use
        this flaw to crash the system.
    
    CVE-2014-3688
    
        It was found that the sctp stack is prone to a remotely triggerable
        memory pressure issue caused by excessive queueing. A remote
        attacker could use this flaw to cause denial-of-service conditions
        on the system.
    
    CVE-2014-3690
    
        Andy Lutomirski discovered that incorrect register handling in KVM
        may lead to denial of service.
    
    CVE-2014-7207
    
        Several Debian developers reported an issue in the IPv6 networking
        subsystem. A local user with access to tun or macvtap devices, or a
        virtual machine connected to such a device, can cause a denial of
        service (system crash).
    
    This update includes a bug fix related to CVE-2014-7207 that disables
    UFO (UDP Fragmentation Offload) in the macvtap, tun, and virtio_net
    drivers. This will cause migration of a running VM from a host running
    an earlier kernel version to a host running this kernel version to fail,
    if the VM has been assigned a virtio network device. In order to migrate
    such a VM, it must be shut down first.
    
    For the stable distribution (wheezy), these problems have been fixed in
    version 3.2.63-2+deb7u1.
    
    We recommend that you upgrade your linux packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.