[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2015:1534-01 -- Redhat kernel, perf

ID: oval:org.secpod.oval:def:501627Date: (C)2015-08-25   (M)2024-03-20
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. * An integer overflow flaw was found in the way the Linux kernel"s netfilter connection tracking implementation loaded extensions. An attacker on a local network could potentially send a sequence of specially crafted packets that would initiate the loading of a large number of extensions, causing the targeted system in that network to crash. * A stack-based buffer overflow flaw was found in the Linux kernel"s early load microcode functionality. On a system with UEFI Secure Boot enabled, a local, privileged user could use this flaw to increase their privileges to the kernel level, bypassing intended restrictions in place. * It was found that the Linux kernel"s ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system. * It was found that the Linux kernel"s TCP/IP protocol suite implementation for IPv6 allowed the Hop Limit value to be set to a smaller value than the default one. An attacker on a local network could use this flaw to prevent systems on that network from sending or receiving network packets. Red Hat would like to thank Nathan Hoad for reporting the CVE-2014-9715 issue. This update also fixes several bugs. Refer to the following Knowledgebase article for further information: https://access.redhat.com/articles/1474193 All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.

Platform:
Red Hat Enterprise Linux 7
Product:
kernel
perf
python-perf
Reference:
RHSA-2015:1534-01
CVE-2014-9715
CVE-2015-2666
CVE-2015-2922
CVE-2015-3636
CVE    4
CVE-2015-2922
CVE-2015-3636
CVE-2015-2666
CVE-2014-9715
...
CPE    8
cpe:/o:redhat:enterprise_linux:7
cpe:/o:linux:linux_kernel:3.19.8
cpe:/o:redhat:enterprise_linux:6
cpe:/o:linux:linux_kernel
...

© SecPod Technologies