Date: Tue, 9 Jun 2015 14:41:22 -0500 Reply-To: Pat RieheckySender: Security Errata for Scientific Linux From: Pat Riehecky Subject: FASTBUGS for SL 7x x86_64 now available MIME-Version: 1.0 The following FASTBUGS have been uploaded to http://ftp.scientificlinux.org/linux/scientific/7x/x86_64/updates/fastbugs/ x86_64: libkkc-0.3.1-8.el7.i686.rpm libkkc-0.3.1-8.el7.x86_64.rpm libkkc-common-0.3.1-8.el7.noarch.rpm libkkc-data-0.3.1-8.el7.x86_64.rpm libkkc-devel-0.3.1-8.el7.i686.rpm libkkc-devel-0.3.1-8.el7.x86_64.rpm libkkc-tools-0.3.1-8.el7.x86_64.rpm Date: Tue, 9 Jun 2015 20:26:18 +0000 Reply-To: scientific-linux-users@listserv.fnal.gov Sender: Security Errata for Scientific Linux From: Pat Riehecky Subject: Security ERRATA Important: kernel on SL6.x i386/x86_64 MIME-Version: 1.0 Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: SLSA-2015:1081-1 Issue Date: 2015-06-09 CVE Numbers: CVE-2015-3331 CVE-2015-1805 CVE-2014-9420 CVE-2014-9419 CVE-2014-9585 -- * It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectorsthat were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) * A buffer overflow flaw was found in the way the Linux kernel's Intel AES-NI instructions optimized version of the RFC4106 GCM mode decryption functionality handled fragmented packets. A remote attacker could use this flaw to crash, or potentially escalate their privileges on, a system over a connection with an active AES-GCM mode IPSec security association. (CVE-2015-3331, Important) * An information leak flaw was found in the way the Linux kernel changed certain segment registers and thread-local storage (TLS) during a context switch. A local, unprivileged user could use this flaw to leak the user space TLS base address of an arbitrary process. (CVE-2014-9419, Low) * It was found that the Linux kernel's ISO file system implementation did not correctly limit the traversal of Rock Ridge extension Continuation Entries (CE). An attacker with physical access to the system could use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service. (CVE-2014-9420, Low) * An information leak flaw was found in the way the Linux kernel's Virtual Dynamic Shared Object (vDSO) implementation performed address randomization. A local, unprivileged user could use this flaw to leak kernel memory addresses to user-space. (CVE-2014-9585, Low) The system must be rebooted for this update to take effect. -- SL6 x86_64 kernel-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.23.4.el6.x86_64.rpm kernel-devel-2.6.32-504.23.4.el6.x86_64.rpm kernel-headers-2.6.32-504.23.4.el6.x86_64.rpm perf-2.6.32-504.23.4.el6.x86_64.rpm perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm python-perf-2.6.32-504.23.4.el6.x86_64.rpm i386 kernel-2.6.32-504.23.4.el6.i686.rpm kernel-debug-2.6.32-504.23.4.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debug-devel-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.23.4.el6.i686.rpm kernel-devel-2.6.32-504.23.4.el6.i686.rpm kernel-headers-2.6.32-504.23.4.el6.i686.rpm perf-2.6.32-504.23.4.el6.i686.rpm perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm python-perf-2.6.32-504.23.4.el6.i686.rpm noarch kernel-abi-whitelists-2.6.32-504.23.4.el6.noarch.rpm kernel-doc-2.6.32-504.23.4.el6.noarch.rpm kernel-firmware-2.6.32-504.23.4.el6.noarch.rpm - Scientific Linux Development Team