[security-announce] Kernel:mm: Security update

Sona Sarmadi sona.sarmadi at enea.com
Mon Feb 16 08:12:39 CET 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

	Enea Linux Security Advisory

=========================================================
Product/package: kernel (FSL kernel: 3.8.11)
Severity: Moderate
Issue date: 2015-02-16
CVE Names: CVE-2014-3122, try_to_unmap_cluster() should
           lock_page() before mlocking
Layer: meta-enea
=========================================================
A security patch that fixes a vulnerability in the kernel's
Memory Management subsystem is now available at
http://linux.enea.com/4.0/patches:

README file: 0037-PPC-kernel-mm-CVE-2014-3122.README
Patch file: 0037-PPC-kernel-mm-CVE-2014-3122.patch

Description
===========
The try_to_unmap_cluster function in mm/rmap.c in the Linux
kernel before 3.14.3 does not properly consider which pages
must be locked, which allows local users to cause a denial of
service (system crash) by triggering a memory-usage pattern
that requires removal of page-table mappings.

References
==========
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122

How to apply the patches
=======================
- - Preparation
Make sure that you have an installation of Enea Linux and have
applied the existing FSL kernel patches in the right order

wget http://linux.enea.com/4.0/Enea-Linux-4.0.tar.gz
tar zxf Enea-Linux-4.0.tar.gz
cd Enea-Linux-4.0/poky/
<Fetch and apply the existing patches >

- - Fetch and apply the new patch
cd Enea-Linux-4.0/poky/meta-enea
wget
http://linux.enea.com/4.0/patches/0037-PPC-kernel-mm-CVE-2014-3122.patch
patch -p1 < ./0037-PPC-kernel-mm-CVE-2014-3122.patch


If you have any questions regarding the security patches and security
updates please contact security at enea.com.

Enea Security Team
Sona Sarmadi
Mobile: +46 70 971 4475
www.enea.com

This message, including attachments, is CONFIDENTIAL. It may also be
privileged or otherwise protected by law. If you received this email
by mistake please let us know by reply and then delete it from your
system; you should not copy it or disclose its contents to anyone.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBAgAGBQJU4ZhnAAoJEHc+9u9ocWoUmloP/jJQMoDFQvYdwsuXMji8ZDSD
+d7IMOOc+wtRLzrdsLWnFD0LDPwrwbIrdqMoDDi6a5LK8IpOc5tInTNyzduB7okS
VS4nLgZVTErJzaC+Y48NX/OX2KHjBPT3oAMKBZXEFaXEDWlL3YXlaDA6lajl+jzT
ApO0y/PERXH1jLvIJWQunEJJ3VkcIn91JP7SS8vcqi24kp2QH5Ze1icQXvrHBnxU
q5lEk0ire54ZA8Tk70Hz1f3LZWm2ID4TFfiyXTkolyNtMMZGPSzg58GbFBXamCOF
QYTr7V25Zqd0OwQpJgWkU4GMzSM/W6/K5Rz8qqUU3xRWXlO+PnzY2tgUqyX5Mxqz
nZjG7vT+v1X7utmLiSHtlJOHHPSN95YDeWpQojeLSs/WqmPyko6n+gFn0d+LKe7y
HAIY/Gp2c2aj5dUIR5j76WXbtgh++t9XeKtepbJm6OtQewvMIqS5tv+UuXa2T3He
bvHGmQwRXI/xjjDu0k854eltv0kFqwviVmkh3fxSfmscmxdyAxY5oojt/aYoPoZs
bxA4ViY2lZ7kq1rqaAMnA9+JuU8g41V8NsweiH3XCaE/DS++Zip5PJLT8A9+PxOi
joD0RRMx9eTxBOoXxLtrtlervbP5OyxzxGw8l0J6t8MF7WhnyaqpJorWgKxQGh6U
Sf4V0QkqGH178LfKwIN3
=kYS+
-----END PGP SIGNATURE-----



More information about the security-announce mailing list