- Home
- CVEs with nessus.description==From+Red+Hat+Security+Advisory+2016%3A0855+%3A%0A%0AAn+update+for+kernel+is+now+available+for+Red+Hat+Enterprise+Linux+6.%0A%0ARed+Hat+Product+Security+has+rated+this+update+as+having+a+security+impact+of+Moderate.+A+Common+Vulnerability+Scoring+System+%28CVSS%29+base+score%2C+which+gives+a+detailed+severity+rating%2C+is+available+for+each+vulnerability+from+the+CVE+link%28s%29+in+the+References+section.%0A%0AThe+kernel+packages+contain+the+Linux+kernel%2C+the+core+of+any+Linux+operating+system.%0A%0ASecurity+Fix%28es%29+%3A%0A%0A%2A+It+was+found+that+reporting+emulation+failures+to+user+space+could+lead+to+either+a+local+%28CVE-2014-7842%29+or+a+L2-%3EL1+%28CVE-2010-5313%29+denial+of+service.+In+the+case+of+a+local+denial+of+service%2C+an+attacker+must+have+access+to+the+MMIO+area+or+be+able+to+access+an+I%2FO+port.+Please+note+that+on+certain+systems%2C+HPET+is+mapped+to+userspace+as+part+of+vdso+%28vvar%29+and+thus+an+unprivileged+user+may+generate+MMIO+transactions+%28and+enter+the+emulator%29+this+way.+%28CVE-2010-5313%2C+CVE-2014-7842%2C+Moderate%29%0A%0A%2A+It+was+found+that+the+Linux+kernel+did+not+properly+account+file+descriptors+passed+over+the+unix+socket+against+the+process+limit.+A+local+user+could+use+this+flaw+to+exhaust+all+available+memory+on+the+system.+%28CVE-2013-4312%2C+Moderate%29%0A%0A%2A+A+buffer+overflow+flaw+was+found+in+the+way+the+Linux+kernel%27s+virtio-net+subsystem+handled+certain+fraglists+when+the+GRO+%28Generic+Receive+Offload%29+functionality+was+enabled+in+a+bridged+network+configuration.+An+attacker+on+the+local+network+could+potentially+use+this+flaw+to+crash+the+system%2C+or%2C+although+unlikely%2C+elevate+their+privileges+on+the+system.+%28CVE-2015-5156%2C+Moderate%29%0A%0A%2A+It+was+found+that+the+Linux+kernel%27s+IPv6+network+stack+did+not+properly+validate+the+value+of+the+MTU+variable+when+it+was+set.+A+remote+attacker+could+potentially+use+this+flaw+to+disrupt+a+target+system%27s+networking+%28packet+loss%29+by+setting+an+invalid+MTU+value%2C+for+example%2C+via+a+NetworkManager+daemon+that+is+processing+router+advertisement+packets+running+on+the+target+system.+%28CVE-2015-8215%2C+Moderate%29%0A%0A%2A+A+NULL+pointer+dereference+flaw+was+found+in+the+way+the+Linux+kernel%27s+network+subsystem+handled+socket+creation+with+an+invalid+protocol+identifier.+A+local+user+could+use+this+flaw+to+crash+the+system.+%28CVE-2015-8543%2C+Moderate%29%0A%0A%2A+It+was+found+that+the+espfix+functionality+does+not+work+for+32-bit+KVM+paravirtualized+guests.+A+local%2C+unprivileged+guest+user+could+potentially+use+this+flaw+to+leak+kernel+stack+addresses.%0A%28CVE-2014-8134%2C+Low%29%0A%0A%2A+A+flaw+was+found+in+the+way+the+Linux+kernel%27s+ext4+file+system+driver+handled+non-journal+file+systems+with+an+orphan+list.+An+attacker+with+physical+access+to+the+system+could+use+this+flaw+to+crash+the+system+or%2C+although+unlikely%2C+escalate+their+privileges+on+the+system.+%28CVE-2015-7509%2C+Low%29%0A%0A%2A+A+NULL+pointer+dereference+flaw+was+found+in+the+way+the+Linux+kernel%27s+ext4+file+system+driver+handled+certain+corrupted+file+system+images.+An+attacker+with+physical+access+to+the+system+could+use+this+flaw+to+crash+the+system.+%28CVE-2015-8324%2C+Low%29%0A%0ARed+Hat+would+like+to+thank+Nadav+Amit+for+reporting+CVE-2010-5313+and+CVE-2014-7842%2C+Andy+Lutomirski+for+reporting+CVE-2014-8134%2C+and+Dmitriy+Monakhov+%28OpenVZ%29+for+reporting+CVE-2015-8324.+The+CVE-2015-5156+issue+was+discovered+by+Jason+Wang+%28Red+Hat%29.%0A%0AAdditional+Changes+%3A%0A%0A%2A+Refer+to+Red+Hat+Enterprise+Linux+6.8+Release+Notes+for+information+on+new+kernel+features+and+known+issues%2C+and+Red+Hat+Enterprise+Linux+Technical+Notes+for+information+on+device+driver+updates%2C+important+changes+to+external+kernel+parameters%2C+notable+bug+fixes%2C+and+technology+previews.+Both+of+these+documents+are+linked+to+in+the+References+section
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top