[LU-6964] Kernel update for RHEL7.1 [3.10.0-229.11.1.el7] Created: 05/Aug/15  Updated: 11/Sep/18  Resolved: 11/Sep/18

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: None

Type: Bug Priority: Minor
Reporter: Bob Glossman (Inactive) Assignee: Bob Glossman (Inactive)
Resolution: Fixed Votes: 0
Labels: None

Issue Links:
Related
Severity: 3
Rank (Obsolete): 9223372036854775807

 Description   
  • An integer overflow flaw was found in the way the Linux kernel's
    netfilter connection tracking implementation loaded extensions. An attacker
    on a local network could potentially send a sequence of specially crafted
    packets that would initiate the loading of a large number of extensions,
    causing the targeted system in that network to crash. (CVE-2014-9715,
    Moderate)
  • A stack-based buffer overflow flaw was found in the Linux kernel's early
    load microcode functionality. On a system with UEFI Secure Boot enabled, a
    local, privileged user could use this flaw to increase their privileges to
    the kernel (ring0) level, bypassing intended restrictions in place.
    (CVE-2015-2666, Moderate)
  • It was found that the Linux kernel's ping socket implementation did not
    properly handle socket unhashing during spurious disconnects, which could
    lead to a use-after-free flaw. On x86-64 architecture systems, a local user
    able to create ping sockets could use this flaw to crash the system.
    On non-x86-64 architecture systems, a local user able to create ping
    sockets could use this flaw to escalate their privileges on the system.
    (CVE-2015-3636, Moderate)
  • It was found that the Linux kernel's TCP/IP protocol suite implementation
    for IPv6 allowed the Hop Limit value to be set to a smaller value than the
    default one. An attacker on a local network could use this flaw to prevent
    systems on that network from sending or receiving network packets.
    (CVE-2015-2922, Low)

Bugs fixed (https://bugzilla.redhat.com/):

1203712 - CVE-2015-2922 kernel: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements.
1204722 - CVE-2015-2666 kernel: execution in the early microcode loader
1208684 - CVE-2014-9715 kernel: netfilter connection tracking extensions denial of service
1218074 - CVE-2015-3636 kernel: ping sockets: use-after-free leading to local privilege escalation



 Comments   
Comment by Gerrit Updater [ 06/Aug/15 ]

Bob Glossman (bob.glossman@intel.com) uploaded a new patch: http://review.whamcloud.com/15873
Subject: LU-6964 kernel: kernel update RHEL 7.1 [3.10.0-229.11.1.el7]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: 37abad0c177bafb45a7e8c662cff2373858a5b9e

Generated at Sat Feb 10 02:04:49 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.