SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Linux)  >   Linux Kernel Vendors:   kernel.org
(CentOS Issues Fix) Linux Kernel __driver_rfc4106_decrypt() Buffer Overflow May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1032613
SecurityTracker URL:  http://securitytracker.com/id/1032613
CVE Reference:   CVE-2015-3331   (Links to External Site)
Date:  Jun 18 2015
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): CentOS 6
Description:   A vulnerability was reported in the Linux Kernel. A remote user can cause denial of service conditions on the target system. A remote user may be able to execute arbitrary code on the target system.

A remote user can send specially crafted data to trigger a buffer overflow in the __driver_rfc4106_decrypt() function in 'arch/x86/crypto/aesni-intel_glue.c' to cause the target system to crash or potentially execute arbitrary code.

Systems built with the Intel AES-NI instructions for AES algorithm support (CONFIG_CRYPTO_AES_NI_INTEL) are affected.

Impact:   A remote user can cause denial of service conditions.

A remote user may be able to execute arbitrary code on the target system.

Solution:   CentOS has issued a fix.

i386:
d5c1966620f84ccab7edaf66f6afb22f9ecd6e04a7984fe7219c6de5cccb58e1 kernel-2.6.32-504.23.4.el6.i686.rpm
498332d60af7984457d4625079eee39610b34430a867abd438041ae0cd14e536 kernel-abi-whitelists-2.6.32-504.23.4.el6.noarch.rpm
3a23bda2a131224c3cddfff1277808eca907e2ddee3b4bf8a30e2a4be21336e7 kernel-debug-2.6.32-504.23.4.el6.i686.rpm
fe25ad53f16867495982b7434251123ef2cc56062ea68ac84cb108d598f47f1a kernel-debug-devel-2.6.32-504.23.4.el6.i686.rpm
cb44e984932ba7cb6347177725720792a8bfc8a21d8321769d389c2afa25f015 kernel-devel-2.6.32-504.23.4.el6.i686.rpm
5befd5a8f9fc10dbcdbb0727a3b655f7ede6dc3dad56035fcd16b4b807f23178 kernel-doc-2.6.32-504.23.4.el6.noarch.rpm
7a9ac9ee5fd79d7c0132caab23bfe9b6fd997251058a7785848e00b849f438b4 kernel-firmware-2.6.32-504.23.4.el6.noarch.rpm
334c58dc74f19c6b7b2454d0cee3e1926649faf8ba72f2d9f9ac458b3cad6b9b kernel-headers-2.6.32-504.23.4.el6.i686.rpm
6345191d4908522508bbeff9b551a7af54808ff040c67b7ea1bdd19b5b0c9f80 perf-2.6.32-504.23.4.el6.i686.rpm
3c2d06c4e149ce2171819d59b6b469e52ac147d8fcc948174b4a11c2991af4e7 python-perf-2.6.32-504.23.4.el6.i686.rpm

x86_64:
d224bbd26a640dbc315324a5f1ad6efa2bddecf598dca0b0597be5cd4923f2e3 kernel-2.6.32-504.23.4.el6.x86_64.rpm
498332d60af7984457d4625079eee39610b34430a867abd438041ae0cd14e536 kernel-abi-whitelists-2.6.32-504.23.4.el6.noarch.rpm
0b4496b3ae0e491e52becda9be5a63723cc656e4a333fda21fa8d3db593641c1 kernel-debug-2.6.32-504.23.4.el6.x86_64.rpm
00890e79590caab4726eb27da4bdfce1a3460c2865bc3378f33236e59d077d4e kernel-debug-devel-2.6.32-504.23.4.el6.x86_64.rpm
8fe850b0d0760a9648e5baac6883355ed2d46461d48b225158f943542adc25d9 kernel-devel-2.6.32-504.23.4.el6.x86_64.rpm
5befd5a8f9fc10dbcdbb0727a3b655f7ede6dc3dad56035fcd16b4b807f23178 kernel-doc-2.6.32-504.23.4.el6.noarch.rpm
7a9ac9ee5fd79d7c0132caab23bfe9b6fd997251058a7785848e00b849f438b4 kernel-firmware-2.6.32-504.23.4.el6.noarch.rpm
2b1b840d6743ecf0f5f1085a2ba1103e38231e249932cb4c0a3ee75dabdede1f kernel-headers-2.6.32-504.23.4.el6.x86_64.rpm
5da5546aed626186ffa91d3523ae6cfad18a5e5123d73e3cf022625f199673c7 perf-2.6.32-504.23.4.el6.x86_64.rpm
e1b6d439abab6929a60c8081352a6c727d8cba235fcd8cda5b0bb7f27085eb74 python-perf-2.6.32-504.23.4.el6.x86_64.rpm

Source:
81ef629cac158b5efac57e713db8e6995c8a5eb2f8a53e0e09b133889045c9e0 kernel-2.6.32-504.23.4.el6.src.rpm

Vendor URL:  www.kernel.org/ (Links to External Site)
Cause:   Boundary error

Message History:   This archive entry is a follow-up to the message listed below.
May 28 2015 Linux Kernel __driver_rfc4106_decrypt() Buffer Overflow May Let Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [CentOS-announce] CESA-2015:1081 Important CentOS 6 kernel Security Update


CentOS Errata and Security Advisory 2015:1081 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1081.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
d5c1966620f84ccab7edaf66f6afb22f9ecd6e04a7984fe7219c6de5cccb58e1  kernel-2.6.32-504.23.4.el6.i686.rpm
498332d60af7984457d4625079eee39610b34430a867abd438041ae0cd14e536  kernel-abi-whitelists-2.6.32-504.23.4.el6.noarch.rpm
3a23bda2a131224c3cddfff1277808eca907e2ddee3b4bf8a30e2a4be21336e7  kernel-debug-2.6.32-504.23.4.el6.i686.rpm
fe25ad53f16867495982b7434251123ef2cc56062ea68ac84cb108d598f47f1a  kernel-debug-devel-2.6.32-504.23.4.el6.i686.rpm
cb44e984932ba7cb6347177725720792a8bfc8a21d8321769d389c2afa25f015  kernel-devel-2.6.32-504.23.4.el6.i686.rpm
5befd5a8f9fc10dbcdbb0727a3b655f7ede6dc3dad56035fcd16b4b807f23178  kernel-doc-2.6.32-504.23.4.el6.noarch.rpm
7a9ac9ee5fd79d7c0132caab23bfe9b6fd997251058a7785848e00b849f438b4  kernel-firmware-2.6.32-504.23.4.el6.noarch.rpm
334c58dc74f19c6b7b2454d0cee3e1926649faf8ba72f2d9f9ac458b3cad6b9b  kernel-headers-2.6.32-504.23.4.el6.i686.rpm
6345191d4908522508bbeff9b551a7af54808ff040c67b7ea1bdd19b5b0c9f80  perf-2.6.32-504.23.4.el6.i686.rpm
3c2d06c4e149ce2171819d59b6b469e52ac147d8fcc948174b4a11c2991af4e7  python-perf-2.6.32-504.23.4.el6.i686.rpm

x86_64:
d224bbd26a640dbc315324a5f1ad6efa2bddecf598dca0b0597be5cd4923f2e3  kernel-2.6.32-504.23.4.el6.x86_64.rpm
498332d60af7984457d4625079eee39610b34430a867abd438041ae0cd14e536  kernel-abi-whitelists-2.6.32-504.23.4.el6.noarch.rpm
0b4496b3ae0e491e52becda9be5a63723cc656e4a333fda21fa8d3db593641c1  kernel-debug-2.6.32-504.23.4.el6.x86_64.rpm
00890e79590caab4726eb27da4bdfce1a3460c2865bc3378f33236e59d077d4e  kernel-debug-devel-2.6.32-504.23.4.el6.x86_64.rpm
8fe850b0d0760a9648e5baac6883355ed2d46461d48b225158f943542adc25d9  kernel-devel-2.6.32-504.23.4.el6.x86_64.rpm
5befd5a8f9fc10dbcdbb0727a3b655f7ede6dc3dad56035fcd16b4b807f23178  kernel-doc-2.6.32-504.23.4.el6.noarch.rpm
7a9ac9ee5fd79d7c0132caab23bfe9b6fd997251058a7785848e00b849f438b4  kernel-firmware-2.6.32-504.23.4.el6.noarch.rpm
2b1b840d6743ecf0f5f1085a2ba1103e38231e249932cb4c0a3ee75dabdede1f  kernel-headers-2.6.32-504.23.4.el6.x86_64.rpm
5da5546aed626186ffa91d3523ae6cfad18a5e5123d73e3cf022625f199673c7  perf-2.6.32-504.23.4.el6.x86_64.rpm
e1b6d439abab6929a60c8081352a6c727d8cba235fcd8cda5b0bb7f27085eb74  python-perf-2.6.32-504.23.4.el6.x86_64.rpm

Source:
81ef629cac158b5efac57e713db8e6995c8a5eb2f8a53e0e09b133889045c9e0  kernel-2.6.32-504.23.4.el6.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC