SB2015121502 - Red Hat update for kernel
Published: December 15, 2015
Security Bulletin ID
SB2015121502
Severity
Low
Patch available
YES
Number of vulnerabilities
5
Exploitation vector
Adjecent network
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2015-2925)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists in the prepend_path function in fs/dcache.c due to improper handling of rename actions inside a bind mount. A local attacker can bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack" and gain root privileges.
2) Improper check or handling of exceptional conditions (CVE-ID: CVE-2015-5307)
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.The weakness exists in the KVM subsystem due to many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c. An adjacent attacker can cause the service to crash.
3) Race condition (CVE-ID: CVE-2015-7613)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists in the IPC object implementation due to race condition. A local attacker can trigger an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c and gain root privileges.
4) Improper input validation (CVE-ID: CVE-2015-7872)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists in the key_gc_unused_keys function in security/keys/gc.c due to improper input validation. A local attacker can submit specially crafted keyctl commands and cause the service to crash.
5) Improper check or handling of exceptional conditions (CVE-ID: CVE-2015-8104)
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.The weakness exists in the KVM subsystem due to many #DB (aka Debug) exceptions, related to svm.c. An adjacent attacker can cause the service to crash.
Remediation
Install update from vendor's website.