Security update for Linux kernel (important)

2014-12-24T08:05:54
ID SUSE-SU-2014:1698-1
Type suse
Reporter Suse
Modified 2014-12-24T08:05:54

Description

The SUSE Linux Enterprise 11 Service Pack 2 LTSS kernel has been updated to fix security issues on kernels on the x86_64 architecture.

The following security bugs have been fixed:

   *

     CVE-2014-9322: A local privilege escalation in the x86_64 32bit

compatibility signal handling was fixed, which could have been used by local attackers to crash the machine or execute code.

   *

     CVE-2014-9090: The do_double_fault function in

arch/x86/kernel/traps.c in the Linux kernel did not properly handle faults associated with the Stack Segment (SS) segment register, which allowed local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the 1 -clock-tests test suite.

   *

     CVE-2014-8133: Insufficient validation of TLS register usage could

have leaked information from the kernel stack to userspace.

Security Issues:

   * CVE-2014-8133
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133</a>>
   * CVE-2014-9090
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090</a>>
   * CVE-2014-9322
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322</a>>