[LU-4620] Kernel update [RHEL6.5 2.6.32-431.5.1.el6] Created: 12/Feb/14  Updated: 24/Mar/14  Resolved: 20/Feb/14

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: Lustre 2.6.0, Lustre 2.5.1

Type: Improvement Priority: Blocker
Reporter: Bob Glossman (Inactive) Assignee: Bob Glossman (Inactive)
Resolution: Fixed Votes: 0
Labels: MB

Issue Links:
Blocker
Related
is related to LU-4628 Kernel update [RHEL6.5 2.6.32-431.5.1... Resolved
Rank (Obsolete): 12645

 Description   

This update fixes the following security issues:

  • A buffer overflow flaw was found in the way the qeth_snmp_command()
    function in the Linux kernel's QETH network device driver implementation
    handled SNMP IOCTL requests with an out-of-bounds length. A local,
    unprivileged user could use this flaw to crash the system or, potentially,
    escalate their privileges on the system. (CVE-2013-6381, Important)
  • A flaw was found in the way the get_dumpable() function return value was
    interpreted in the ptrace subsystem of the Linux kernel. When
    'fs.suid_dumpable' was set to 2, a local, unprivileged local user could
    use this flaw to bypass intended ptrace restrictions and obtain
    potentially sensitive information. (CVE-2013-2929, Low)
  • It was found that certain protocol handlers in the Linux kernel's
    networking implementation could set the addr_len value without initializing
    the associated data structure. A local, unprivileged user could use this
    flaw to leak kernel stack memory to user space using the recvmsg, recvfrom,
    and recvmmsg system calls (CVE-2013-7263, CVE-2013-7265, Low).

This update also fixes several bugs.

Bugs fixed (https://bugzilla.redhat.com/):

1028148 - CVE-2013-2929 kernel: exec/ptrace: get_dumpable() incorrect tests
1033600 - CVE-2013-6381 Kernel: qeth: buffer overflow in snmp ioctl
1035875 - CVE-2013-7263 CVE-2013-7265 Kernel: net: leakage of uninitialized memory to user-space via recv syscalls



 Comments   
Comment by Bob Glossman (Inactive) [ 13/Feb/14 ]

http://review.whamcloud.com/9253

Comment by Bob Glossman (Inactive) [ 13/Feb/14 ]

client builds failing. apparently need some TEI work for the new version. example errors:

+++ yumdownloader --destdir /var/lib/jenkins/lbuild-data/kernelrpm/2.6.32/rhel6/i686/yum61HYOn kernel-devel-2.6.32-431.5.1.el6
+++ fatal 1 'failed to fetch kernel-devel-2.6.32-431.5.1.el6 with yumdownloader.'
+++ cleanup
+++ true
+++ error 'failed to fetch kernel-devel-2.6.32-431.5.1.el6 with yumdownloader.'
+++ local 'msg=failed to fetch kernel-devel-2.6.32-431.5.1.el6 with yumdownloader.'
+++ '[' -n 'failed to fetch kernel-devel-2.6.32-431.5.1.el6 with yumdownloader.' ']'
+++ echo -e '\nlbuild: failed to fetch kernel-devel-2.6.32-431.5.1.el6 with yumdownloader.'

lbuild: failed to fetch kernel-devel-2.6.32-431.5.1.el6 with yumdownloader.

will enter a new TEI ticket

Comment by Bob Glossman (Inactive) [ 19/Feb/14 ]

in b2_5:
http://review.whamcloud.com/9318

Comment by Peter Jones [ 20/Feb/14 ]

Landed for 2.5.1 and 2.6

Comment by Jay Lan (Inactive) [ 24/Mar/14 ]

Plan to land this one for 2.4.x also?

Generated at Sat Feb 10 01:44:22 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.