SB2015121711 - Fedora 22 update for kernel
Published: December 17, 2015 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2013-7446)
The vulnerability allows a local user to damange or delete data.
The vulnerability exists due to a use-after-free error within the unix_release_sock(), unix_create1(), unix_dgram_sendmsg(), unix_state_lock(), unix_state_unlock() and unix_dgram_poll() functions in net/unix/af_unix.c. A local user can damange or delete data.
2) NULL pointer dereference/Race condition (CVE-ID: CVE-2015-7550)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness in the keyctl_read_key function in security/keys/keyctl.c due to improper use of a semaphore. A local attacker can submit a specially crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls, trigger NULL pointer dereference and cause the service o crash.
3) NULL pointer dereference (CVE-ID: CVE-2015-8543)
The vulnerability allows a local attacker to cause DoS condition or gain elevated privileges on the target system.The weakness exists in the networking implementation due to improper validation of protocol identifiers for certain protocol families. A local attacker can trigger NULL pointer dereference or gain root privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
Remediation
Install update from vendor's website.