Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2014:0520-1
Type: Security Advisory
Severity: Important
Issued on: 2014-05-20
Last updated on: 2014-05-20
Affected Products: Red Hat Enterprise Linux Server AUS (v. 6.2)
CVEs (cve.mitre.org): CVE-2014-0101
CVE-2014-0196
CVE-2014-2523

Details

Updated kernel packages that fix two security issues and one bug are now
available for Red Hat Enterprise Linux 6.2 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

* A flaw was found in the way the Linux kernel processed an authenticated
COOKIE_ECHO chunk during the initialization of an SCTP connection. A remote
attacker could use this flaw to crash the system by initiating a specially
crafted SCTP handshake in order to trigger a NULL pointer dereference on
the system. (CVE-2014-0101, Important)

* A race condition flaw, leading to heap-based buffer overflows, was found
in the way the Linux kernel's N_TTY line discipline (LDISC) implementation
handled concurrent processing of echo output and TTY write operations
originating from user space when the underlying TTY driver was PTY.
An unprivileged, local user could use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2014-0196,
Important)

Red Hat would like to thank Nokia Siemens Networks for reporting
CVE-2014-0101.

This update also fixes the following bug:

* Prior to this update, a guest-provided value was used as the head length
of the socket buffer allocated on the host. If the host was under heavy
memory load and the guest-provided value was too large, the allocation
could have failed, resulting in stalls and packet drops in the guest's Tx
path. With this update, the guest-provided value has been limited to a
reasonable size so that socket buffer allocations on the host succeed
regardless of the memory load on the host, and guests can send packets
without experiencing packet drops or stalls. (BZ#1092349)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
kernel-2.6.32-220.51.1.el6.src.rpm
File outdated by:  RHSA-2015:0695
    MD5: fa1e0ba424829b9750ead43ede86593c
SHA-256: 77780c104d3eaf4b6f35122afb8311b742a544e9757bdeb786a9f222d2b12b84
 
x86_64:
kernel-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: c923e838afd05f2e349b153e52b48032
SHA-256: 1fae77c9314b74a79d2cc465fe4d1a69bbe2685c71a8038b6f8e827cae21fdbd
kernel-debug-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: 3d3e7fdbc888562d2668a1f0237c6ac5
SHA-256: 6e3a054988aab84426d05bf2221fc8704e0db96701c919dce63eaeedd18b090c
kernel-debug-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: 8b98dadd51b75c40d4265abb26c8f135
SHA-256: 802b833f121acd94c6809a3e67bbe296807b242a438214331f35400d18fa391f
kernel-debug-devel-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: 7452f863ec9c3d6ae8be7631008643b9
SHA-256: d6979be058b751d94d3ecd6669a118e19621a23efaf55dcef0a3426e0f08fc22
kernel-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: 7784da02a82a0a10ed44812a1817b4da
SHA-256: d1fe923188af2378a92c21cc0a2a1ef7e08b2cfd7a51276354452f06502242e2
kernel-debuginfo-common-x86_64-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: c563320760a37616d910700585112ad6
SHA-256: 9f2a2031c31689fb3a785933583273d3426087daf8289b1429026c9a1dc4d266
kernel-devel-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: 22caccf160c5dcfaa7c351c42d060f10
SHA-256: b66eb464f293f858819a8d21a4980a96848a370ea97ea94ca078925f5abe7964
kernel-doc-2.6.32-220.51.1.el6.noarch.rpm
File outdated by:  RHSA-2015:0695
    MD5: dd0c30b15a60a2c33fd7aea6dd12f7de
SHA-256: 59b12f45ea4b246b396a668c4e592e5f97c801eb1b817f7df26e81442231ca7e
kernel-firmware-2.6.32-220.51.1.el6.noarch.rpm
File outdated by:  RHSA-2015:0695
    MD5: a214777c9491d6496cb22df9269243b3
SHA-256: 578e592ea2595082e2fdcad27d00b666cb46e52b35f492269b13fa10a199ea1b
kernel-headers-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: bbcb81731afc933fc84072be3bf65fa6
SHA-256: 0ebf14b7540728f4c5cc058135f02055c58420015877251a208bc3778e00e599
perf-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: 7565e1210080426e32a46ea5a16b0b25
SHA-256: ef05bb1c216bd7d29fc4e1db3c3b4d5f43a8f8959c30ceec3a9b8f433712f853
perf-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: c4e42dd417a5bda031b0b6c685a53c97
SHA-256: 4a37d491b4130bf4c906168254d0d20a738f7d077a3555834e3e8da1cc0b183f
python-perf-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: fc3c0951504ff2dfe60a088b45c380b6
SHA-256: b2bbbea3fb02f40074df4fcce8f9f382970e15bd32b9e22cf779e89614c733b8
python-perf-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:0695
    MD5: 8ae8a017a0d7e0a12c2d167b58d07e05
SHA-256: 5dc3c1125eb23817131c9f6e0b211ae5155dc1008a651cf55e163ef39e4941ae
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1070705 - CVE-2014-0101 kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
1094232 - CVE-2014-0196 kernel: pty layer race condition leading to memory corruption


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/