SB2015121710 - Fedora 23 update for kernel
Published: December 17, 2015 Updated: April 24, 2025
Security Bulletin ID
SB2015121710
Severity
Low
Patch available
YES
Number of vulnerabilities
3
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2013-7446)
The vulnerability allows a local user to damange or delete data.
The vulnerability exists due to a use-after-free error within the unix_release_sock(), unix_create1(), unix_dgram_sendmsg(), unix_state_lock(), unix_state_unlock() and unix_dgram_poll() functions in net/unix/af_unix.c. A local user can damange or delete data.
2) NULL pointer dereference/Race condition (CVE-ID: CVE-2015-7550)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness in the keyctl_read_key function in security/keys/keyctl.c due to improper use of a semaphore. A local attacker can submit a specially crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls, trigger NULL pointer dereference and cause the service o crash.
3) NULL pointer dereference (CVE-ID: CVE-2015-8543)
The vulnerability allows a local attacker to cause DoS condition or gain elevated privileges on the target system.The weakness exists in the networking implementation due to improper validation of protocol identifiers for certain protocol families. A local attacker can trigger NULL pointer dereference or gain root privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
Remediation
Install update from vendor's website.