Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-6847

Kernel update [RHEL6.6 2.6.32-504.30.3.el6]

    XMLWordPrintable

Details

    • Bug
    • Resolution: Fixed
    • Minor
    • Lustre 2.8.0
    • None
    • None
    • 3
    • 9223372036854775807

    Description

      • A NULL pointer dereference flaw was found in the way the Linux kernel's
        virtual console implementation handled reference counting when accessing
        pseudo-terminal device files (/dev/pts/*). A local, unprivileged attacker
        could use this flaw to crash the system. (CVE-2011-5321, Moderate)
      • It was found that the Linux kernel's ping socket implementation did not
        properly handle socket unhashing during spurious disconnects, which could
        lead to a use-after-free flaw. On x86-64 architecture systems, a local user
        able to create ping sockets could use this flaw to crash the system.
        On non-x86-64 architecture systems, a local user able to create ping
        sockets could use this flaw to escalate their privileges on the system.
        (CVE-2015-3636, Moderate)
      • An integer overflow flaw was found in the way the Linux kernel randomized
        the stack for processes on certain 64-bit architecture systems, such as
        x86-64, causing the stack entropy to be reduced by four. (CVE-2015-1593,
        Low)
      • A flaw was found in the way the Linux kernel's 32-bit emulation
        implementation handled forking or closing of a task with an 'int80' entry.
        A local user could potentially use this flaw to escalate their privileges
        on the system. (CVE-2015-2830, Low)
      • It was found that the Linux kernel's TCP/IP protocol suite implementation
        for IPv6 allowed the Hop Limit value to be set to a smaller value than the
        default one. An attacker on a local network could use this flaw to prevent
        systems on that network from sending or receiving network packets.
        (CVE-2015-2922, Low)

      Bugs fixed (https://bugzilla.redhat.com/):

      1192519 - CVE-2015-1593 kernel: Linux stack ASLR implementation Integer overflow
      1201887 - CVE-2011-5321 Kernel: tty: driver reference leakage in tty_open
      1203712 - CVE-2015-2922 kernel: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements.
      1208598 - CVE-2015-2830 kernel: int80 fork from 64-bit tasks mishandling
      1218074 - CVE-2015-3636 kernel: ping sockets: use-after-free leading to local privilege escalation

      Attachments

        Issue Links

          Activity

            People

              bogl Bob Glossman (Inactive)
              bogl Bob Glossman (Inactive)
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: