Security Advisory Important: kernel security, bug fix, and enhancement update

Advisory: RHSA-2014:0786-1
Type: Security Advisory
Severity: Important
Issued on: 2014-06-24
Last updated on: 2014-06-24
Affected Products: Red Hat Enterprise Linux Desktop (v. 7)
Red Hat Enterprise Linux HPC Node (v. 7)
Red Hat Enterprise Linux Server (v. 7)
Red Hat Enterprise Linux Workstation (v. 7)
CVEs (cve.mitre.org): CVE-2014-0206
CVE-2014-1737
CVE-2014-1738
CVE-2014-2568
CVE-2014-2851
CVE-2014-3144
CVE-2014-3145
CVE-2014-3153

Details

Updated kernel packages that fix multiple security issues, several bugs,
and add various enhancements are now available for Red Hat Enterprise
Linux 7.

The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

* A flaw was found in the way the Linux kernel's futex subsystem handled
the requeuing of certain Priority Inheritance (PI) futexes. A local,
unprivileged user could use this flaw to escalate their privileges on the
system. (CVE-2014-3153, Important)

* A use-after-free flaw was found in the way the ping_init_sock() function
of the Linux kernel handled the group_info reference counter. A local,
unprivileged user could use this flaw to crash the system or, potentially,
escalate their privileges on the system. (CVE-2014-2851, Important)

* Use-after-free and information leak flaws were found in the way the
Linux kernel's floppy driver processed the FDRAWCMD IOCTL command. A local
user with write access to /dev/fdX could use these flaws to escalate their
privileges on the system. (CVE-2014-1737, CVE-2014-1738, Important)

* It was found that the aio_read_events_ring() function of the Linux
kernel's Asynchronous I/O (AIO) subsystem did not properly sanitize the AIO
ring head received from user space. A local, unprivileged user could use
this flaw to disclose random parts of the (physical) memory belonging to
the kernel and/or other processes. (CVE-2014-0206, Moderate)

* An out-of-bounds memory access flaw was found in the Netlink Attribute
extension of the Berkeley Packet Filter (BPF) interpreter functionality in
the Linux kernel's networking implementation. A local, unprivileged user
could use this flaw to crash the system or leak kernel memory to user space
via a specially crafted socket filter. (CVE-2014-3144, CVE-2014-3145,
Moderate)

* An information leak flaw was found in the way the skb_zerocopy() function
copied socket buffers (skb) that are backed by user-space buffers (for
example vhost-net and Xen netback), potentially allowing an attacker to
read data from those buffers. (CVE-2014-2568, Low)

Red Hat would like to thank Kees Cook of Google for reporting
CVE-2014-3153 and Matthew Daley for reporting CVE-2014-1737 and CVE-2014-1738.
Google acknowledges Pinkie Pie as the original reporter of
CVE-2014-3153. The CVE-2014-0206 issue was discovered by Mateusz Guzik of
Red Hat.

This update also fixes the following bugs:

* Due to incorrect calculation of Tx statistics in the qlcninc driver,
running the "ethtool -S ethX" command could trigger memory corruption.
As a consequence, running the sosreport tool, that uses this command,
resulted in a kernel panic. The problem has been fixed by correcting the
said statistics calculation. (BZ#1104972)

* When an attempt to create a file on the GFS2 file system failed due to a
file system quota violation, the relevant VFS inode was not completely
uninitialized. This could result in a list corruption error. This update
resolves this problem by correctly uninitializing the VFS inode in this
situation. (BZ#1097407)

* Due to a race condition in the kernel, the getcwd() system call could
return "/" instead of the correct full path name when querying a path name
of a file or directory. Paths returned in the "/proc" file system could
also be incorrect. This problem was causing instability of various
applications. The aforementioned race condition has been fixed and getcwd()
now always returns the correct paths. (BZ#1099048)

In addition, this update adds the following enhancements:

* The kernel mutex code has been improved. The changes include improved
queuing of the MCS spin locks, the MCS code optimization, introduction of
the cancellable MCS spin locks, and improved handling of mutexes without
wait locks. (BZ#1103631, BZ#1103629)

* The handling of the Virtual Memory Area (VMA) cache and huge page faults
has been improved. (BZ#1103630)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
enhancements. The system must be rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
kernel-3.10.0-123.4.2.el7.src.rpm
File outdated by:  RHSA-2015:0102
    MD5: 52e209c02acd2bdf48d389eb9299d935
SHA-256: 8ec575c88bca035ba5269c45673cf41cdb721268cde2f3d8b4726a5f0b21afcd
 
x86_64:
kernel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 214e0eab1410c40f942943df9b9bac77
SHA-256: 0d5a44869675a7133f9e5f61be2087f35fc3bd1feb14d696e9e8e0af11c79a75
kernel-abi-whitelists-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: d92fb5eccdf33538b9633233b9aba45b
SHA-256: 5532650eb88e86fc509324ec7651fc252dd7c1d4550e973632339ea9611d3969
kernel-debug-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 528f93a581b7da2bdc4e9fb176bd907e
SHA-256: b68c2af395fb382675ceb5b709a8544b58b38f6a89b7c707f0effb02fc73036b
kernel-debug-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 0fc523badd87d51cf6cd12b22127a7a3
SHA-256: f97ff15c033c23b7985b6de6c818f208ea2f36cc168092a7c2e6ef3e30fee66c
kernel-debug-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 064a0cfc42732522953f301e3553eb82
SHA-256: 6a348f1f73487d6fa61f3432b019c5dad1762caf3aa12e7576bdc5707fe64df3
kernel-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 9287601b6dd45d40763aa6086b64c272
SHA-256: e77d3789314a272006ab2ac6bee8d35dfd1084c0d8afc1599c0eab1b457dce5f
kernel-debuginfo-common-x86_64-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 570bb1beaf95174f171fe44b8ed62f05
SHA-256: 4c392ab24f0dfae616e4864a4e9e6f3a5d311b49f2339529b4a77887f150318c
kernel-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: d00d00d35a54268c3994b8c9aceb2434
SHA-256: ea3647de68bafdf9284cd395c537703150b3af9e9b6f74c73b8c06b08ba65e1c
kernel-doc-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: c15a949c982c6e810166e50a57cacf32
SHA-256: 6c45f2ce60340401e250c194408165dec3cf3df6cf83bc1185f7dd0e6490715c
kernel-headers-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: ef4228b3fbeb260a3ba565a3dc859a51
SHA-256: 6cd862c28da794e0c56db94ecb2c23278ef1cb031bc4c31bbdca0e962ca13221
kernel-tools-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 7a732052cca480f607090a7ed5e21e0a
SHA-256: 981c80d3efc439e203bbdbf48e8c5f13db76858713ecb019c5a82b76a9bbd98a
kernel-tools-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: af0ad731372a0d6669177ad9097a279e
SHA-256: 8b3be23f7d475984a3a95bc67abb4db5d4c75903f85ccdcd946a4ddcde18db36
kernel-tools-libs-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 87d2ca5968f4115af6469ed61528c9c8
SHA-256: a099f3aab4629cc5062c6b721ed0f7eaa752eb487f8e79810ab09b8c05a2ef59
kernel-tools-libs-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 5809441877a59c73884434790a3d6824
SHA-256: 387a754734db233b587a500f14e9e61623b5755a86a7fe2bdc590ef55cc54a47
perf-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: d4c028aaa5ead5bc2c975682e6502dd8
SHA-256: fe200f6b9f6afcad10243e84324133481a581a88907572fcdc8fc630a41ceb1a
perf-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: be0f483cddb788a1067a33d455f38bba
SHA-256: 9735b3c3827d7d7266c294a58c4b08bce026366c81c00e4da506dfe71c4e18e0
python-perf-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 9dfaee8102e8f14265d7daa5581015f9
SHA-256: d1ca032e5d8d3ffb5705d3e892861513ae4096672798d24d4f87512c1fb4ee2a
python-perf-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: e91aa759e367fe0ce229a896269214b9
SHA-256: 26c195e5f6490a758aa17509347606b97b59974315a1d7aa175cfd4b317da369
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
kernel-3.10.0-123.4.2.el7.src.rpm
File outdated by:  RHSA-2015:0102
    MD5: 52e209c02acd2bdf48d389eb9299d935
SHA-256: 8ec575c88bca035ba5269c45673cf41cdb721268cde2f3d8b4726a5f0b21afcd
 
x86_64:
kernel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 214e0eab1410c40f942943df9b9bac77
SHA-256: 0d5a44869675a7133f9e5f61be2087f35fc3bd1feb14d696e9e8e0af11c79a75
kernel-abi-whitelists-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: d92fb5eccdf33538b9633233b9aba45b
SHA-256: 5532650eb88e86fc509324ec7651fc252dd7c1d4550e973632339ea9611d3969
kernel-debug-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 528f93a581b7da2bdc4e9fb176bd907e
SHA-256: b68c2af395fb382675ceb5b709a8544b58b38f6a89b7c707f0effb02fc73036b
kernel-debug-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 0fc523badd87d51cf6cd12b22127a7a3
SHA-256: f97ff15c033c23b7985b6de6c818f208ea2f36cc168092a7c2e6ef3e30fee66c
kernel-debug-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 064a0cfc42732522953f301e3553eb82
SHA-256: 6a348f1f73487d6fa61f3432b019c5dad1762caf3aa12e7576bdc5707fe64df3
kernel-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 9287601b6dd45d40763aa6086b64c272
SHA-256: e77d3789314a272006ab2ac6bee8d35dfd1084c0d8afc1599c0eab1b457dce5f
kernel-debuginfo-common-x86_64-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 570bb1beaf95174f171fe44b8ed62f05
SHA-256: 4c392ab24f0dfae616e4864a4e9e6f3a5d311b49f2339529b4a77887f150318c
kernel-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: d00d00d35a54268c3994b8c9aceb2434
SHA-256: ea3647de68bafdf9284cd395c537703150b3af9e9b6f74c73b8c06b08ba65e1c
kernel-doc-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: c15a949c982c6e810166e50a57cacf32
SHA-256: 6c45f2ce60340401e250c194408165dec3cf3df6cf83bc1185f7dd0e6490715c
kernel-headers-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: ef4228b3fbeb260a3ba565a3dc859a51
SHA-256: 6cd862c28da794e0c56db94ecb2c23278ef1cb031bc4c31bbdca0e962ca13221
kernel-tools-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 7a732052cca480f607090a7ed5e21e0a
SHA-256: 981c80d3efc439e203bbdbf48e8c5f13db76858713ecb019c5a82b76a9bbd98a
kernel-tools-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: af0ad731372a0d6669177ad9097a279e
SHA-256: 8b3be23f7d475984a3a95bc67abb4db5d4c75903f85ccdcd946a4ddcde18db36
kernel-tools-libs-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 87d2ca5968f4115af6469ed61528c9c8
SHA-256: a099f3aab4629cc5062c6b721ed0f7eaa752eb487f8e79810ab09b8c05a2ef59
kernel-tools-libs-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 5809441877a59c73884434790a3d6824
SHA-256: 387a754734db233b587a500f14e9e61623b5755a86a7fe2bdc590ef55cc54a47
perf-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: d4c028aaa5ead5bc2c975682e6502dd8
SHA-256: fe200f6b9f6afcad10243e84324133481a581a88907572fcdc8fc630a41ceb1a
perf-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: be0f483cddb788a1067a33d455f38bba
SHA-256: 9735b3c3827d7d7266c294a58c4b08bce026366c81c00e4da506dfe71c4e18e0
python-perf-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 9dfaee8102e8f14265d7daa5581015f9
SHA-256: d1ca032e5d8d3ffb5705d3e892861513ae4096672798d24d4f87512c1fb4ee2a
python-perf-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: e91aa759e367fe0ce229a896269214b9
SHA-256: 26c195e5f6490a758aa17509347606b97b59974315a1d7aa175cfd4b317da369
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
kernel-3.10.0-123.4.2.el7.src.rpm
File outdated by:  RHSA-2015:0102
    MD5: 52e209c02acd2bdf48d389eb9299d935
SHA-256: 8ec575c88bca035ba5269c45673cf41cdb721268cde2f3d8b4726a5f0b21afcd
 
PPC:
kernel-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: c15934cff6bd02ca1958f3c42cbedbb1
SHA-256: 0edee53e9d86b95b38c2f03cb27e8e01b16a5c1518042eb4a8b804c5cd8ff3a3
kernel-abi-whitelists-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: d92fb5eccdf33538b9633233b9aba45b
SHA-256: 5532650eb88e86fc509324ec7651fc252dd7c1d4550e973632339ea9611d3969
kernel-bootwrapper-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: cc60f53ec113154755d29708d8ccdff1
SHA-256: 795528ab0bcd96562c1c382d16781dd89fb7a0a5a9e423d8dd2097bbf2348506
kernel-debug-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 556f5c2bf88aa913439f2b58eb751275
SHA-256: 9d12c20368c9055c9e04d924634d8417154139ae3fbaa07df003dc1ffe4b684f
kernel-debug-debuginfo-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 5494cc340394d731937a3b10fca246e2
SHA-256: 05938593a9a9aa30735cd33da2509b5a1d9b6dc7e1346c4bd8629f24e50563af
kernel-debug-devel-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: e94ec7e7d88fcbab3268d7f9c8f19bee
SHA-256: af1beac63ab9cf34df701d4da1ee1634b152466b0150088dbca5260e308f04f4
kernel-debuginfo-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 7bb5027f4d57102dadddca31a1e99c70
SHA-256: 7b98551fe68cf3591f16dea75ad8aed0015470f4e112258b88e39fecb832e808
kernel-debuginfo-common-ppc64-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 3b70647726d70261e7471554b6048cb1
SHA-256: 9d2f23f64c33130ce4893da7a6798fc1c6cd1640bd9ecbe9e7b7e1afd4c2176b
kernel-devel-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: b9490eff30ca7d1c09ac705f915ed4f5
SHA-256: 3b4731dba911dbab0929af8218f133fe2fe0c3e8c30d43943caf72aa3e6288c2
kernel-doc-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: c15a949c982c6e810166e50a57cacf32
SHA-256: 6c45f2ce60340401e250c194408165dec3cf3df6cf83bc1185f7dd0e6490715c
kernel-headers-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 60a04f03fccb1766e592485e5479833b
SHA-256: 6b1aa8cba615ec54e0c0b381593425dcb0148fafa6d3c7bd4a85cbbd1610ef05
kernel-tools-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 556433716fcd178f290fec0223aed1dc
SHA-256: 088f3687c385f77b788e388da958ee39dc200980d37510eaa6112f3a6be51ecd
kernel-tools-debuginfo-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 6377c7db86ad9d10e6a0f55e0e63aa6f
SHA-256: 337ced83b7ee82b94aa208b9d721e9046e2226fe9a2a27b154b8b309673ea22a
kernel-tools-libs-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: abb0faf3f4c31382362035d8d69dee1e
SHA-256: 8070fbbe20f4dcdd5b41b6c828797212cfb6134f2cb7d4d6f543ddd51139ff56
kernel-tools-libs-devel-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 92a9196142c6605e3ee65263cfbc8499
SHA-256: 5baab281872593351ecfce698d93a2276134becdf8c47fd2e76a5ef40b475c97
perf-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: fb42b41dfcb5defd7f5dfdd190e099ed
SHA-256: bba888a5dc6f3c65b89c5a8c8a466302dddfdb60af473b0dcb4778aa6e1a7c19
perf-debuginfo-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 4f5ec2a9ff2e2f9f95ce22600ee70d61
SHA-256: b4dfba37755b9ccf911c7482821db4d4ae1fd90373134c09f79b2e4ebdf1db62
python-perf-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 48f621c5aee586717bfc2ab48978d9aa
SHA-256: 1ce53be8c59efa2041ec44f3f876c9e8366ed094259387918db49a622d019793
python-perf-debuginfo-3.10.0-123.4.2.el7.ppc64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 6dee8ee6454f7c0736aa2771c461d8d5
SHA-256: e9a4ad3009d3d50423fb0610161c272321af4244908c1f7db94654cf5ed1a4b8
 
s390x:
kernel-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: 733e08f5adb182d6a0d7ce917da1a05b
SHA-256: 6520faf8f8e9d7dab48113fb4ffe6591929007246f7e107a62c5fc93afe28286
kernel-abi-whitelists-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: d92fb5eccdf33538b9633233b9aba45b
SHA-256: 5532650eb88e86fc509324ec7651fc252dd7c1d4550e973632339ea9611d3969
kernel-debug-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: ab4c77e1d3f509d8e4a9ea5e149bf83b
SHA-256: c22b1bf18c8458a4e2c134d1b2081dfefb02f54888293ef3738082799c67aa5f
kernel-debug-debuginfo-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: b160cee1bdf6c812a1cdb8695afccf1a
SHA-256: c0b162669b3456e4fba8225709b5c0cfec445f1cc0439b8af206f26fb33127f1
kernel-debug-devel-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: f443424887020b1f985a0e098bead7cc
SHA-256: 2a31014c1b826a17ef9d131b6159fbae5a1ad76678c73ccbaffa21e34ec68205
kernel-debuginfo-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: 60105b7e7f6ef151f356ab5513a69e26
SHA-256: 9a2557f5db917d37007a6dd6bf228d94d8abf0963218964b0e19cb04c5d6d986
kernel-debuginfo-common-s390x-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: 52f686d1efd299de6111698f547dcf60
SHA-256: 25addc639da5dc828b81383074629978f488f858963f8fd5f6b19f420138e34f
kernel-devel-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: c4a14d02c025ed8268f81cff11c46977
SHA-256: d8c1447bc137ff20426593bd7932e0d335cddb77b8c88ac577a7d0a312e44c4e
kernel-doc-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: c15a949c982c6e810166e50a57cacf32
SHA-256: 6c45f2ce60340401e250c194408165dec3cf3df6cf83bc1185f7dd0e6490715c
kernel-headers-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: de4e8da8e609f715e907b1e2cd7b48fd
SHA-256: 95e152e0f52ca822556521448605b9607f3cfcecdaf70d4bbffde667632b6446
kernel-kdump-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: 9c091773b062f568bc4e9109c2dabfb3
SHA-256: ada7282e274608a5afdda2ff607b59726c238095c0ddaea8672b0bb2a2a34a1f
kernel-kdump-debuginfo-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: d80adcefef26d1950725b05fccc3c00e
SHA-256: 779e79e0deec744942a2898f4f407f8ff1f3c4aab8d6940b85954f649fe20141
kernel-kdump-devel-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: 727330136b043afeb3d24c9e95e49abd
SHA-256: 2d64c9834e814de9bdbe76e0fef5a993641cf90362425c5f4fb6aa47ccf79b5f
perf-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: 636eadf5260012ffb98d35429d69a5b9
SHA-256: d7f79a294ba8ff1e7e04947da0f5dc49e2d99cccf8a9fe493768243f487fe917
perf-debuginfo-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: ca03757fdc841481ab283f9075757a68
SHA-256: 8a19940ed7be771cd2c086b3dd6000f1d51b449da4c8455cd2755250ad32cecc
python-perf-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: 1d340ae0e1a96b7620339ee0f75d9a6e
SHA-256: a12f32332509f0473948c60591e1c1765b07dcca600fae9112fb5c7a83b26f1c
python-perf-debuginfo-3.10.0-123.4.2.el7.s390x.rpm
File outdated by:  RHSA-2015:0102
    MD5: 786b8338898110270bf118e8d97c17a8
SHA-256: 91788dd5edd07d3c424b401f67534972b233528dc00ca93e80049846f5dcea6d
 
x86_64:
kernel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 214e0eab1410c40f942943df9b9bac77
SHA-256: 0d5a44869675a7133f9e5f61be2087f35fc3bd1feb14d696e9e8e0af11c79a75
kernel-abi-whitelists-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: d92fb5eccdf33538b9633233b9aba45b
SHA-256: 5532650eb88e86fc509324ec7651fc252dd7c1d4550e973632339ea9611d3969
kernel-debug-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 528f93a581b7da2bdc4e9fb176bd907e
SHA-256: b68c2af395fb382675ceb5b709a8544b58b38f6a89b7c707f0effb02fc73036b
kernel-debug-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 0fc523badd87d51cf6cd12b22127a7a3
SHA-256: f97ff15c033c23b7985b6de6c818f208ea2f36cc168092a7c2e6ef3e30fee66c
kernel-debug-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 064a0cfc42732522953f301e3553eb82
SHA-256: 6a348f1f73487d6fa61f3432b019c5dad1762caf3aa12e7576bdc5707fe64df3
kernel-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 9287601b6dd45d40763aa6086b64c272
SHA-256: e77d3789314a272006ab2ac6bee8d35dfd1084c0d8afc1599c0eab1b457dce5f
kernel-debuginfo-common-x86_64-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 570bb1beaf95174f171fe44b8ed62f05
SHA-256: 4c392ab24f0dfae616e4864a4e9e6f3a5d311b49f2339529b4a77887f150318c
kernel-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: d00d00d35a54268c3994b8c9aceb2434
SHA-256: ea3647de68bafdf9284cd395c537703150b3af9e9b6f74c73b8c06b08ba65e1c
kernel-doc-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: c15a949c982c6e810166e50a57cacf32
SHA-256: 6c45f2ce60340401e250c194408165dec3cf3df6cf83bc1185f7dd0e6490715c
kernel-headers-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: ef4228b3fbeb260a3ba565a3dc859a51
SHA-256: 6cd862c28da794e0c56db94ecb2c23278ef1cb031bc4c31bbdca0e962ca13221
kernel-tools-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 7a732052cca480f607090a7ed5e21e0a
SHA-256: 981c80d3efc439e203bbdbf48e8c5f13db76858713ecb019c5a82b76a9bbd98a
kernel-tools-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: af0ad731372a0d6669177ad9097a279e
SHA-256: 8b3be23f7d475984a3a95bc67abb4db5d4c75903f85ccdcd946a4ddcde18db36
kernel-tools-libs-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 87d2ca5968f4115af6469ed61528c9c8
SHA-256: a099f3aab4629cc5062c6b721ed0f7eaa752eb487f8e79810ab09b8c05a2ef59
kernel-tools-libs-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 5809441877a59c73884434790a3d6824
SHA-256: 387a754734db233b587a500f14e9e61623b5755a86a7fe2bdc590ef55cc54a47
perf-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: d4c028aaa5ead5bc2c975682e6502dd8
SHA-256: fe200f6b9f6afcad10243e84324133481a581a88907572fcdc8fc630a41ceb1a
perf-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: be0f483cddb788a1067a33d455f38bba
SHA-256: 9735b3c3827d7d7266c294a58c4b08bce026366c81c00e4da506dfe71c4e18e0
python-perf-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 9dfaee8102e8f14265d7daa5581015f9
SHA-256: d1ca032e5d8d3ffb5705d3e892861513ae4096672798d24d4f87512c1fb4ee2a
python-perf-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: e91aa759e367fe0ce229a896269214b9
SHA-256: 26c195e5f6490a758aa17509347606b97b59974315a1d7aa175cfd4b317da369
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
kernel-3.10.0-123.4.2.el7.src.rpm
File outdated by:  RHSA-2015:0102
    MD5: 52e209c02acd2bdf48d389eb9299d935
SHA-256: 8ec575c88bca035ba5269c45673cf41cdb721268cde2f3d8b4726a5f0b21afcd
 
x86_64:
kernel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 214e0eab1410c40f942943df9b9bac77
SHA-256: 0d5a44869675a7133f9e5f61be2087f35fc3bd1feb14d696e9e8e0af11c79a75
kernel-abi-whitelists-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: d92fb5eccdf33538b9633233b9aba45b
SHA-256: 5532650eb88e86fc509324ec7651fc252dd7c1d4550e973632339ea9611d3969
kernel-debug-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 528f93a581b7da2bdc4e9fb176bd907e
SHA-256: b68c2af395fb382675ceb5b709a8544b58b38f6a89b7c707f0effb02fc73036b
kernel-debug-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 0fc523badd87d51cf6cd12b22127a7a3
SHA-256: f97ff15c033c23b7985b6de6c818f208ea2f36cc168092a7c2e6ef3e30fee66c
kernel-debug-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 064a0cfc42732522953f301e3553eb82
SHA-256: 6a348f1f73487d6fa61f3432b019c5dad1762caf3aa12e7576bdc5707fe64df3
kernel-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 9287601b6dd45d40763aa6086b64c272
SHA-256: e77d3789314a272006ab2ac6bee8d35dfd1084c0d8afc1599c0eab1b457dce5f
kernel-debuginfo-common-x86_64-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 570bb1beaf95174f171fe44b8ed62f05
SHA-256: 4c392ab24f0dfae616e4864a4e9e6f3a5d311b49f2339529b4a77887f150318c
kernel-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: d00d00d35a54268c3994b8c9aceb2434
SHA-256: ea3647de68bafdf9284cd395c537703150b3af9e9b6f74c73b8c06b08ba65e1c
kernel-doc-3.10.0-123.4.2.el7.noarch.rpm
File outdated by:  RHSA-2015:0102
    MD5: c15a949c982c6e810166e50a57cacf32
SHA-256: 6c45f2ce60340401e250c194408165dec3cf3df6cf83bc1185f7dd0e6490715c
kernel-headers-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: ef4228b3fbeb260a3ba565a3dc859a51
SHA-256: 6cd862c28da794e0c56db94ecb2c23278ef1cb031bc4c31bbdca0e962ca13221
kernel-tools-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 7a732052cca480f607090a7ed5e21e0a
SHA-256: 981c80d3efc439e203bbdbf48e8c5f13db76858713ecb019c5a82b76a9bbd98a
kernel-tools-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: af0ad731372a0d6669177ad9097a279e
SHA-256: 8b3be23f7d475984a3a95bc67abb4db5d4c75903f85ccdcd946a4ddcde18db36
kernel-tools-libs-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 87d2ca5968f4115af6469ed61528c9c8
SHA-256: a099f3aab4629cc5062c6b721ed0f7eaa752eb487f8e79810ab09b8c05a2ef59
kernel-tools-libs-devel-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 5809441877a59c73884434790a3d6824
SHA-256: 387a754734db233b587a500f14e9e61623b5755a86a7fe2bdc590ef55cc54a47
perf-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: d4c028aaa5ead5bc2c975682e6502dd8
SHA-256: fe200f6b9f6afcad10243e84324133481a581a88907572fcdc8fc630a41ceb1a
perf-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: be0f483cddb788a1067a33d455f38bba
SHA-256: 9735b3c3827d7d7266c294a58c4b08bce026366c81c00e4da506dfe71c4e18e0
python-perf-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: 9dfaee8102e8f14265d7daa5581015f9
SHA-256: d1ca032e5d8d3ffb5705d3e892861513ae4096672798d24d4f87512c1fb4ee2a
python-perf-debuginfo-3.10.0-123.4.2.el7.x86_64.rpm
File outdated by:  RHSA-2015:0102
    MD5: e91aa759e367fe0ce229a896269214b9
SHA-256: 26c195e5f6490a758aa17509347606b97b59974315a1d7aa175cfd4b317da369
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1079012 - CVE-2014-2568 kernel: net: potential information leak when ubuf backed skbs are skb_zerocopy()ied
1086730 - CVE-2014-2851 kernel: net: ping: refcount issue in ping_init_sock() function
1094299 - CVE-2014-1737 CVE-2014-1738 kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command
1094602 - CVE-2014-0206 kernel: aio: insufficient sanitization of head in aio_read_events_ring()
1096775 - CVE-2014-3144 CVE-2014-3145 Kernel: filter: prevent nla extensions to peek beyond the end of the message
1103626 - CVE-2014-3153 kernel: futex: pi futexes requeue issue


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/