Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.130007
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2015-0386)
Resumen:The remote host is missing an update for the 'btrfs-progs, iproute2, kernel, kernel-firmware, kernel-firmware-nonfree, kernel-userspace-headers, kmod-broadcom-wl, kmod-fglrx, kmod-nvidia304, kmod-nvidia340, kmod-nvidia-current, kmod-xtables-addons, nvidia304, nvidia340, radeon-firmware, xtables-addons' package(s) announced via the MGASA-2015-0386 advisory.
Descripción:Summary:
The remote host is missing an update for the 'btrfs-progs, iproute2, kernel, kernel-firmware, kernel-firmware-nonfree, kernel-userspace-headers, kmod-broadcom-wl, kmod-fglrx, kmod-nvidia304, kmod-nvidia340, kmod-nvidia-current, kmod-xtables-addons, nvidia304, nvidia340, radeon-firmware, xtables-addons' package(s) announced via the MGASA-2015-0386 advisory.

Vulnerability Insight:
This kernel update provides an upgrade to the upstream 4.1 longterm kernel
series, currently based on 4.1.8 and resolves at least the following
security issues:

It was found that the Linux kernel's keyring implementation would leak
memory when adding a key to a keyring via the add_key() function. A
local attacker could use this flaw to exhaust all available memory on
the system. (CVE-2015-1333)

A flaw was found in the Linux kernel where the deletion of a file or
directory could trigger an unmount and reveal data under a mount point.
This flaw was inadvertently introduced with the new feature of being able
to lazily unmount a mount tree when using file system user namespaces.
(CVE-2015-4176)

A flaw was discovered in the kernel's collect_mounts function. If the kernel
audit subsystem called collect_mounts to audit an unmounted path, it could
panic the system. With this flaw, an unprivileged user could call umount
(MNT_DETACH) to launch a denial-of-service attack. (CVE-2015-4177)

A flaw was found in the Linux kernel which is related to the user namespace
lazily unmounting file systems. The fs_pin struct has two members (m_list
and s_list) which are usually initialized on use in the pin_insert_group
function. However, these members might go unmodified, in this case, the
system panics when it attempts to destroy or free them. This flaw could be
used to launch a denial-of-service attack. (CVE-2015-4178)

A DoS flaw was found for a Linux kernel built for the x86 architecture which
had the KVM virtualization support(CONFIG_KVM) enabled. The kernel would be
vulnerable to a NULL pointer dereference flaw in Linux kernel's
kvm_apic_has_events() function while doing an ioctl. An unprivileged user
able to access the '/dev/kvm' device could use this flaw to crash the system
kernel. (CVE-2015-4692)

A flaw was found in the kernel's implementation of the Berkeley Packet
Filter (BPF). A local attacker could craft BPF code to crash the system
by creating a situation in which the JIT compiler would fail to correctly
optimize the JIT image on the last pass. This would lead to the CPU
executing instructions that were not part of the JIT code. (CVE-2015-4700)

The get_bitmap_file function in drivers/md/md.c in the Linux kernel before
4.1.6 does not initialize a certain bitmap data structure, which allows
local users to obtain sensitive information from kernel memory via a
GET_BITMAP_FILE ioctl call. (CVE-2015-5697)

Use-after-free vulnerability in the path_openat function in fs/namei.c in
the Linux kernel 3.x and 4.x before 4.0.4 allows local users to cause a
denial of service or possibly have unspecified other impact via O_TMPFILE
filesystem operations that leverage a duplicate cleanup operation.
(CVE-2015-5706)

It was discovered that an integer overflow error existed in the SCSIgeneric
(sg) driver in the Linux kernel. A local attacker with writepermission to a
SCSI generic device could ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'btrfs-progs, iproute2, kernel, kernel-firmware, kernel-firmware-nonfree, kernel-userspace-headers, kmod-broadcom-wl, kmod-fglrx, kmod-nvidia304, kmod-nvidia340, kmod-nvidia-current, kmod-xtables-addons, nvidia304, nvidia340, radeon-firmware, xtables-addons' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-1333
BugTraq ID: 76050
http://www.securityfocus.com/bid/76050
Debian Security Information: DSA-3329 (Google Search)
http://www.debian.org/security/2015/dsa-3329
http://www.openwall.com/lists/oss-security/2015/07/27/7
RedHat Security Advisories: RHSA-2015:1778
http://rhn.redhat.com/errata/RHSA-2015-1778.html
RedHat Security Advisories: RHSA-2015:1787
http://rhn.redhat.com/errata/RHSA-2015-1787.html
http://www.ubuntu.com/usn/USN-2687-1
http://www.ubuntu.com/usn/USN-2688-1
http://www.ubuntu.com/usn/USN-2689-1
http://www.ubuntu.com/usn/USN-2690-1
http://www.ubuntu.com/usn/USN-2691-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-4176
[oss-security] 20150604 Re: Re: CVE request Linux kernel: ns: user namespaces panic
http://www.openwall.com/lists/oss-security/2015/06/04/5
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e0c9c0afd2fc958ffa34b697972721d81df8a56f
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2
https://bugzilla.redhat.com/show_bug.cgi?id=1249442
https://github.com/torvalds/linux/commit/e0c9c0afd2fc958ffa34b697972721d81df8a56f
Common Vulnerability Exposure (CVE) ID: CVE-2015-4177
[oss-security] 20150529 CVE request Linux kernel: ns: user namespaces panic
http://openwall.com/lists/oss-security/2015/05/29/5
[oss-security] 20150529 Re: CVE request Linux kernel: ns: user namespaces panic
http://openwall.com/lists/oss-security/2015/05/29/10
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cd4a40174b71acd021877341684d8bb1dc8ea4ae
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.5
https://bugzilla.redhat.com/show_bug.cgi?id=1248486
https://github.com/torvalds/linux/commit/cd4a40174b71acd021877341684d8bb1dc8ea4ae
Common Vulnerability Exposure (CVE) ID: CVE-2015-4178
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=820f9f147dcce2602eefd9b575bbbd9ea14f0953
https://bugzilla.redhat.com/show_bug.cgi?id=1249849
https://github.com/torvalds/linux/commit/820f9f147dcce2602eefd9b575bbbd9ea14f0953
Common Vulnerability Exposure (CVE) ID: CVE-2015-4692
BugTraq ID: 75142
http://www.securityfocus.com/bid/75142
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160829.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161144.html
http://www.openwall.com/lists/oss-security/2015/06/21/1
http://www.securitytracker.com/id/1032798
SuSE Security Announcement: SUSE-SU-2015:1324 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
SuSE Security Announcement: openSUSE-SU-2015:1382 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://www.ubuntu.com/usn/USN-2680-1
http://www.ubuntu.com/usn/USN-2681-1
http://www.ubuntu.com/usn/USN-2682-1
http://www.ubuntu.com/usn/USN-2683-1
http://www.ubuntu.com/usn/USN-2684-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-4700
BugTraq ID: 75356
http://www.securityfocus.com/bid/75356
http://www.openwall.com/lists/oss-security/2015/06/23/2
http://www.securitytracker.com/id/1033046
SuSE Security Announcement: SUSE-SU-2015:1224 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
SuSE Security Announcement: SUSE-SU-2015:1478 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
SuSE Security Announcement: SUSE-SU-2015:1487 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html
SuSE Security Announcement: SUSE-SU-2015:1488 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html
SuSE Security Announcement: SUSE-SU-2015:1489 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html
SuSE Security Announcement: SUSE-SU-2015:1490 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html
SuSE Security Announcement: SUSE-SU-2015:1491 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html
SuSE Security Announcement: SUSE-SU-2015:1592 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
SuSE Security Announcement: SUSE-SU-2015:1611 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.ubuntu.com/usn/USN-2679-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-5697
BugTraq ID: 76066
http://www.securityfocus.com/bid/76066
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html
http://www.openwall.com/lists/oss-security/2015/07/28/2
http://www.securitytracker.com/id/1033211
SuSE Security Announcement: SUSE-SU-2015:1727 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
http://www.ubuntu.com/usn/USN-2731-1
http://www.ubuntu.com/usn/USN-2732-1
http://www.ubuntu.com/usn/USN-2748-1
http://www.ubuntu.com/usn/USN-2749-1
http://www.ubuntu.com/usn/USN-2751-1
http://www.ubuntu.com/usn/USN-2752-1
http://www.ubuntu.com/usn/USN-2777-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-5706
BugTraq ID: 76142
http://www.securityfocus.com/bid/76142
http://twitter.com/grsecurity/statuses/597127122910490624
http://www.openwall.com/lists/oss-security/2015/08/01/5
Common Vulnerability Exposure (CVE) ID: CVE-2015-5707
BugTraq ID: 76145
http://www.securityfocus.com/bid/76145
http://www.openwall.com/lists/oss-security/2015/08/01/6
http://www.securitytracker.com/id/1033521
SuSE Security Announcement: SUSE-SU-2015:2084 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html
SuSE Security Announcement: SUSE-SU-2015:2085 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html
SuSE Security Announcement: SUSE-SU-2015:2086 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html
SuSE Security Announcement: SUSE-SU-2015:2087 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html
SuSE Security Announcement: SUSE-SU-2015:2089 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html
SuSE Security Announcement: SUSE-SU-2015:2090 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html
SuSE Security Announcement: SUSE-SU-2015:2091 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html
http://www.ubuntu.com/usn/USN-2733-1
http://www.ubuntu.com/usn/USN-2734-1
http://www.ubuntu.com/usn/USN-2737-1
http://www.ubuntu.com/usn/USN-2738-1
http://www.ubuntu.com/usn/USN-2750-1
http://www.ubuntu.com/usn/USN-2759-1
http://www.ubuntu.com/usn/USN-2760-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-7312
Debian Security Information: DSA-3364 (Google Search)
http://www.debian.org/security/2015/dsa-3364
http://sourceforge.net/p/aufs/mailman/message/34449209/
http://www.openwall.com/lists/oss-security/2015/09/22/10
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.