MGASA-2015-0221

Source
https://advisories.mageia.org/MGASA-2015-0221.html
Import Source
https://advisories.mageia.org/MGASA-2015-0221.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0221
Related
Published
2015-05-13T17:18:54Z
Modified
2015-05-13T17:07:08Z
Summary
Updated kernel-linus packages fix security vulnerabilities
Details

This kernel update is based on upstream -longterm 3.14.41 and fixes the following security issues:

net/netfilter/nfconntrackproto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers (CVE-2014-8160).

The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction (CVE-2015-0239).

It was found that the Linux kernel's ping socket implementation didn't properly handle socket unhashing during spurious disconnects which could lead to use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to increase their privileges on the system. Note: By default ping sockets are disabled on the system (net.ipv4.pinggrouprange = 1 0) and have to be explicitly enabled by the system administrator for specific user groups in order to exploit this issue (CVE-2015-3636).

For other fixes in this update, see the referenced changelogs.

References
Credits

Affected packages

Mageia:4 / kernel-linus

Package

Name
kernel-linus
Purl
pkg:rpm/mageia/kernel-linus?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.14.41-1.mga4

Ecosystem specific

{
    "section": "core"
}