SB2015121710 - Fedora 23 update for kernel 



SB2015121710 - Fedora 23 update for kernel

Published: December 17, 2015 Updated: April 24, 2025

Security Bulletin ID SB2015121710
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2013-7446)

The vulnerability allows a local user to damange or delete data.

The vulnerability exists due to a use-after-free error within the unix_release_sock(), unix_create1(), unix_dgram_sendmsg(), unix_state_lock(), unix_state_unlock() and unix_dgram_poll() functions in net/unix/af_unix.c. A local user can damange or delete data.


2) NULL pointer dereference/Race condition (CVE-ID: CVE-2015-7550)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness in the keyctl_read_key function in security/keys/keyctl.c due to improper use of a semaphore. A local attacker can submit a specially crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls, trigger NULL pointer dereference and cause the service o crash.

3) NULL pointer dereference (CVE-ID: CVE-2015-8543)

The vulnerability allows a local attacker to cause DoS condition or gain elevated privileges on the target system.

The weakness exists in the networking implementation due to improper validation of protocol identifiers for certain protocol families. A local attacker can trigger NULL pointer dereference or gain root privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.

Remediation

Install update from vendor's website.