{"id":"MGASA-2014-0318","summary":"Updated kernel packages fix security vulnerabilities","details":"This kernel update provides the upstream 3.10.50 longterm kernel and\nfixes the following security issues:\n\nArray index error in the aio_read_events_ring function in fs/aio.c in\nthe Linux kernel through 3.15.1 allows local users to obtain sensitive\ninformation from kernel memory via a large head value (CVE-2014-0206).\n\nmm/shmem.c in the Linux kernel through 3.15.1 does not properly implement\nthe interaction between range notification and hole punching, which allows\nlocal users to cause a denial of service (i_mutex hold) by using the mmap\nsystem call to access a hole, as demonstrated by interfering with intended\nshmem activity by blocking completion of (1) an MADV_REMOVE madvise call\nor (2) an FALLOC_FL_PUNCH_HOLE fallocate call (CVE-2014-4171).\n\narch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit\nx86 platforms, when syscall auditing is enabled and the sep CPU feature\nflag is set, allows local users to cause a denial of service (OOPS and\nsystem crash) via an invalid syscall number, as demonstrated by number\n1000 (CVE-2014-4508). \n\nLinux kernel built with the support for Stream Control Transmission\nProtocol (CONFIG_IP_SCTP) is vulnerable to a NULL pointer dereference\nflaw. It could occur when simultaneous new connections are initiated\nbetween a same pair of hosts. A remote user/program could use this\nflaw to crash the system kernel resulting in DoS (CVE-2014-5077).\n","modified":"2026-04-16T06:24:29.106191799Z","published":"2014-08-05T21:36:30Z","upstream":["CVE-2014-0206","CVE-2014-4171","CVE-2014-4508","CVE-2014-5077"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0318.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=13802"},{"type":"WEB","url":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.45"},{"type":"WEB","url":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.46"},{"type":"WEB","url":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47"},{"type":"WEB","url":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.48"},{"type":"WEB","url":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.49"},{"type":"WEB","url":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.50"}],"affected":[{"package":{"name":"kernel","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/kernel?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.10.50-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0318.json"}},{"package":{"name":"kernel-userspace-headers","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/kernel-userspace-headers?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.10.50-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0318.json"}},{"package":{"name":"kmod-vboxadditions","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/kmod-vboxadditions?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.3.10-10.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0318.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.3.10-10.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0318.json"}},{"package":{"name":"kmod-xtables-addons","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/kmod-xtables-addons?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3-20.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0318.json"}},{"package":{"name":"kmod-broadcom-wl","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/kmod-broadcom-wl?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.30.223.141-20.mga3.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0318.json"}},{"package":{"name":"kmod-fglrx","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/kmod-fglrx?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"13.251-10.mga3.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0318.json"}},{"package":{"name":"kmod-nvidia173","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/kmod-nvidia173?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"173.14.38-35.mga3.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0318.json"}},{"package":{"name":"kmod-nvidia304","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/kmod-nvidia304?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"304.108-20.mga3.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0318.json"}},{"package":{"name":"kmod-nvidia-current","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/kmod-nvidia-current?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"319.60-20.mga3.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0318.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}