Updated kernel packages that fix two security issues and one bug are nowavailable for Red Hat Enterprise Linux 6.2 Extended Update Support.The Red Hat Security Response Team has rated this update as havingImportant security impact. Common Vulnerability Scoring System (CVSS) basescores, which give detailed severity ratings, are available for eachvulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.* A flaw was found in the way the Linux kernel processed an authenticatedCOOKIE_ECHO chunk during the initialization of an SCTP connection. A remoteattacker could use this flaw to crash the system by initiating a speciallycrafted SCTP handshake in order to trigger a NULL pointer dereference onthe system. (CVE-2014-0101, Important)* A race condition flaw, leading to heap-based buffer overflows, was foundin the way the Linux kernel’s N_TTY line discipline (LDISC) implementationhandled concurrent processing of echo output and TTY write operationsoriginating from user space when the underlying TTY driver was PTY.An unprivileged, local user could use this flaw to crash the system or,potentially, escalate their privileges on the system. (CVE-2014-0196,Important)Red Hat would like to thank Nokia Siemens Networks for reportingCVE-2014-0101.This update also fixes the following bug:* Prior to this update, a guest-provided value was used as the head lengthof the socket buffer allocated on the host. If the host was under heavymemory load and the guest-provided value was too large, the allocationcould have failed, resulting in stalls and packet drops in the guest’s Txpath. With this update, the guest-provided value has been limited to areasonable size so that socket buffer allocations on the host succeedregardless of the memory load on the host, and guests can send packetswithout experiencing packet drops or stalls. (BZ#1092349)All kernel users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258To install kernel packages manually, use “rpm -ivh [package]”. Do not use”rpm -Uvh” as that will remove the running kernel binaries from yoursystem. You may use “rpm -e” to remove old kernels after determining thatthe new kernel functions properly on your system.Red Hat Enterprise Linux Server AUS (v. 6.2)

    MD5: fa1e0ba424829b9750ead43ede86593cSHA-256: 77780c104d3eaf4b6f35122afb8311b742a544e9757bdeb786a9f222d2b12b84
    MD5: c923e838afd05f2e349b153e52b48032SHA-256: 1fae77c9314b74a79d2cc465fe4d1a69bbe2685c71a8038b6f8e827cae21fdbd
    MD5: 3d3e7fdbc888562d2668a1f0237c6ac5SHA-256: 6e3a054988aab84426d05bf2221fc8704e0db96701c919dce63eaeedd18b090c
    MD5: 8b98dadd51b75c40d4265abb26c8f135SHA-256: 802b833f121acd94c6809a3e67bbe296807b242a438214331f35400d18fa391f
    MD5: 7452f863ec9c3d6ae8be7631008643b9SHA-256: d6979be058b751d94d3ecd6669a118e19621a23efaf55dcef0a3426e0f08fc22
    MD5: 7784da02a82a0a10ed44812a1817b4daSHA-256: d1fe923188af2378a92c21cc0a2a1ef7e08b2cfd7a51276354452f06502242e2
    MD5: c563320760a37616d910700585112ad6SHA-256: 9f2a2031c31689fb3a785933583273d3426087daf8289b1429026c9a1dc4d266
    MD5: 22caccf160c5dcfaa7c351c42d060f10SHA-256: b66eb464f293f858819a8d21a4980a96848a370ea97ea94ca078925f5abe7964
    MD5: dd0c30b15a60a2c33fd7aea6dd12f7deSHA-256: 59b12f45ea4b246b396a668c4e592e5f97c801eb1b817f7df26e81442231ca7e
    MD5: a214777c9491d6496cb22df9269243b3SHA-256: 578e592ea2595082e2fdcad27d00b666cb46e52b35f492269b13fa10a199ea1b
    MD5: bbcb81731afc933fc84072be3bf65fa6SHA-256: 0ebf14b7540728f4c5cc058135f02055c58420015877251a208bc3778e00e599
    MD5: 7565e1210080426e32a46ea5a16b0b25SHA-256: ef05bb1c216bd7d29fc4e1db3c3b4d5f43a8f8959c30ceec3a9b8f433712f853
    MD5: c4e42dd417a5bda031b0b6c685a53c97SHA-256: 4a37d491b4130bf4c906168254d0d20a738f7d077a3555834e3e8da1cc0b183f
    MD5: fc3c0951504ff2dfe60a088b45c380b6SHA-256: b2bbbea3fb02f40074df4fcce8f9f382970e15bd32b9e22cf779e89614c733b8
    MD5: 8ae8a017a0d7e0a12c2d167b58d07e05SHA-256: 5dc3c1125eb23817131c9f6e0b211ae5155dc1008a651cf55e163ef39e4941ae
(The unlinked packages above are only available from the Red Hat Network)
1070705 – CVE-2014-0101 kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk1094232 – CVE-2014-0196 kernel: pty layer race condition leading to memory corruption

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply