Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2014:0520 - Security Advisory
Issued:
2014-05-20
Updated:
2014-05-20

RHSA-2014:0520 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix two security issues and one bug are now
available for Red Hat Enterprise Linux 6.2 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A flaw was found in the way the Linux kernel processed an authenticated

COOKIE_ECHO chunk during the initialization of an SCTP connection. A remote
attacker could use this flaw to crash the system by initiating a specially
crafted SCTP handshake in order to trigger a NULL pointer dereference on
the system. (CVE-2014-0101, Important)

  • A race condition flaw, leading to heap-based buffer overflows, was found

in the way the Linux kernel's N_TTY line discipline (LDISC) implementation
handled concurrent processing of echo output and TTY write operations
originating from user space when the underlying TTY driver was PTY.
An unprivileged, local user could use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2014-0196,
Important)

Red Hat would like to thank Nokia Siemens Networks for reporting
CVE-2014-0101.

This update also fixes the following bug:

  • Prior to this update, a guest-provided value was used as the head length

of the socket buffer allocated on the host. If the host was under heavy
memory load and the guest-provided value was too large, the allocation
could have failed, resulting in stalls and packet drops in the guest's Tx
path. With this update, the guest-provided value has been limited to a
reasonable size so that socket buffer allocations on the host succeed
regardless of the memory load on the host, and guests can send packets
without experiencing packet drops or stalls. (BZ#1092349)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 6.2 x86_64

Fixes

  • BZ - 1070705 - CVE-2014-0101 kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
  • BZ - 1094232 - CVE-2014-0196 kernel: pty layer race condition leading to memory corruption

CVEs

  • CVE-2014-0101
  • CVE-2014-2523
  • CVE-2014-0196

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 6.2

SRPM
kernel-2.6.32-220.51.1.el6.src.rpm SHA-256: 77780c104d3eaf4b6f35122afb8311b742a544e9757bdeb786a9f222d2b12b84
x86_64
kernel-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: 1fae77c9314b74a79d2cc465fe4d1a69bbe2685c71a8038b6f8e827cae21fdbd
kernel-debug-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: 6e3a054988aab84426d05bf2221fc8704e0db96701c919dce63eaeedd18b090c
kernel-debug-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: 802b833f121acd94c6809a3e67bbe296807b242a438214331f35400d18fa391f
kernel-debug-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: 802b833f121acd94c6809a3e67bbe296807b242a438214331f35400d18fa391f
kernel-debug-devel-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: d6979be058b751d94d3ecd6669a118e19621a23efaf55dcef0a3426e0f08fc22
kernel-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: d1fe923188af2378a92c21cc0a2a1ef7e08b2cfd7a51276354452f06502242e2
kernel-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: d1fe923188af2378a92c21cc0a2a1ef7e08b2cfd7a51276354452f06502242e2
kernel-debuginfo-common-x86_64-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: 9f2a2031c31689fb3a785933583273d3426087daf8289b1429026c9a1dc4d266
kernel-debuginfo-common-x86_64-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: 9f2a2031c31689fb3a785933583273d3426087daf8289b1429026c9a1dc4d266
kernel-devel-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: b66eb464f293f858819a8d21a4980a96848a370ea97ea94ca078925f5abe7964
kernel-doc-2.6.32-220.51.1.el6.noarch.rpm SHA-256: 59b12f45ea4b246b396a668c4e592e5f97c801eb1b817f7df26e81442231ca7e
kernel-firmware-2.6.32-220.51.1.el6.noarch.rpm SHA-256: 578e592ea2595082e2fdcad27d00b666cb46e52b35f492269b13fa10a199ea1b
kernel-headers-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: 0ebf14b7540728f4c5cc058135f02055c58420015877251a208bc3778e00e599
perf-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: ef05bb1c216bd7d29fc4e1db3c3b4d5f43a8f8959c30ceec3a9b8f433712f853
perf-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: 4a37d491b4130bf4c906168254d0d20a738f7d077a3555834e3e8da1cc0b183f
perf-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: 4a37d491b4130bf4c906168254d0d20a738f7d077a3555834e3e8da1cc0b183f
python-perf-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: b2bbbea3fb02f40074df4fcce8f9f382970e15bd32b9e22cf779e89614c733b8
python-perf-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: 5dc3c1125eb23817131c9f6e0b211ae5155dc1008a651cf55e163ef39e4941ae
python-perf-debuginfo-2.6.32-220.51.1.el6.x86_64.rpm SHA-256: 5dc3c1125eb23817131c9f6e0b211ae5155dc1008a651cf55e163ef39e4941ae

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter