kernel (SL7)

Synopsis: Important: kernel security update
Advisory ID: SLSA-2014:0678-2
Issue Date: 2014-06-10
CVE Numbers: CVE-2014-0196

* A race condition flaw, leading to heap-based buffer overflows, was found
in the way the Linux kernel’s N_TTY line discipline (LDISC) implementation
handled concurrent processing of echo output and TTY write operations
originating from user space when the underlying TTY driver was PTY. An
unprivileged, local user could use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2014-0196,
Important)

The system must be rebooted for this update to take effect.

SL7
x86_64
kernel-3.10.0-123.1.2.el7.x86_64.rpm
kernel-debug-3.10.0-123.1.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-123.1.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-123.1.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-123.1.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-123.1.2.el7.x86_64.rpm
kernel-devel-3.10.0-123.1.2.el7.x86_64.rpm
kernel-headers-3.10.0-123.1.2.el7.x86_64.rpm
kernel-tools-3.10.0-123.1.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-123.1.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-123.1.2.el7.x86_64.rpm
perf-3.10.0-123.1.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-123.1.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-123.1.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-123.1.2.el7.x86_64.rpm
python-perf-3.10.0-123.1.2.el7.x86_64.rpm
noarch
kernel-abi-whitelists-3.10.0-123.1.2.el7.noarch.rpm
kernel-doc-3.10.0-123.1.2.el7.noarch.rpm

– Scientific Linux Development Team