SB2014060519 - Race condition in Linux kernel
Published: June 5, 2014
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Race condition (CVE-ID: CVE-2014-3940)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The Linux kernel through 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering a race condition via numa_maps read operations during hugepage migration, related to fs/proc/task_mmu.c and mm/mempolicy.c.
Remediation
Install update from vendor's website.
References
- http://www.openwall.com/lists/oss-security/2014/06/02/5
- https://bugzilla.redhat.com/show_bug.cgi?id=1104097
- https://lkml.org/lkml/2014/3/18/784
- http://www.securityfocus.com/bid/67786
- http://secunia.com/advisories/59011
- https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html
- http://secunia.com/advisories/61310
- http://rhn.redhat.com/errata/RHSA-2015-0290.html
- http://rhn.redhat.com/errata/RHSA-2015-1272.html