SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Linux)  >   Ping Vendors:   kernel.org
(CentOS Issues Fix) Linux ping Use-After-Free Memory Error Lets Local Users Deny Service and Gain Elevated Privileges
SecurityTracker Alert ID:  1033207
SecurityTracker URL:  http://securitytracker.com/id/1033207
CVE Reference:   CVE-2015-3636   (Links to External Site)
Date:  Aug 6 2015
Impact:   Denial of service via local system, Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): CentOS 7
Description:   A vulnerability was reported in Linux ping. A local user can cause denial of service conditions on the target system. A local user can obtain elevated privileges on the target system.

A local user can make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocols and then make a connect() system call after a disconnect to trigger a use-after-free in the ping_unhash() function to execute arbitrary code or cause the system to crash.

Impact:   A local user can cause the target system to crash.

A local user can obtain root privileges on the target system.

Solution:   CentOS has issued a fix.

x86_64:
df8509c2a913f393f788b7b652a0bd6994465b7afa864cd3c0cacceae2ea0fa9 kernel-3.10.0-229.11.1.el7.x86_64.rpm
43ab20c0fab9cae65be008a012e08250fba13d4fdf59f9b8ef0b0df52b9e8f5b kernel-abi-whitelists-3.10.0-229.11.1.el7.noarch.rpm
ecf690b4fa13da560035f968d0d2ae1a0ab37993c53f42d8b5acf0f683f54cf3 kernel-debug-3.10.0-229.11.1.el7.x86_64.rpm
a43202fd8cd943d6c839ef53787fbc0d78f2c90cf7d305c29040e1856edd141f kernel-debug-devel-3.10.0-229.11.1.el7.x86_64.rpm
d6942959c82870dcf1f89be9866203b77ad646ffa39f18e2c80bc8eaf7634f9e kernel-devel-3.10.0-229.11.1.el7.x86_64.rpm
35d2cc4d3d58189ecf92c46770083e0dd31f96b9509292f75d48840db3ae4fec kernel-doc-3.10.0-229.11.1.el7.noarch.rpm
6c8598490f3a7d994a9c787cc2087b69b5bfd2b2950c98127ccfed791821b0d2 kernel-headers-3.10.0-229.11.1.el7.x86_64.rpm
e0e8e6377d294ebe1fd477c2a024a1e3d54155fb9139570eed7eacac92333a27 kernel-tools-3.10.0-229.11.1.el7.x86_64.rpm
25a9611437634ea3d52e3b884b977dd465f15a7642269250a5ae6c5ae6e7de4b kernel-tools-libs-3.10.0-229.11.1.el7.x86_64.rpm
bbb772c8a3e61afd57c5b97635a457e53bfc3d0b95ba5c8208b27739683d7f1e kernel-tools-libs-devel-3.10.0-229.11.1.el7.x86_64.rpm
be250103a6849432a6f712fdbe2e0cd14cb5fecc06af52a258d68022bd70a3f7 perf-3.10.0-229.11.1.el7.x86_64.rpm
a1e5adeb41fc7a8a0aebdf6cec1c260edaf2b31ec5f044330ae798fb4b57822e python-perf-3.10.0-229.11.1.el7.x86_64.rpm

Source:
a5bf3557362921672d793693137269cd5f361152ef7976890f0b038bb797a573 kernel-3.10.0-229.11.1.el7.src.rpm

Cause:   Access control error

Message History:   This archive entry is a follow-up to the message listed below.
Aug 6 2015 Linux ping Use-After-Free Memory Error Lets Local Users Deny Service and Gain Elevated Privileges



 Source Message Contents

Subject:  [CentOS-announce] CESA-2015:1534 Moderate CentOS 7 kernel Security Update


CentOS Errata and Security Advisory 2015:1534 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1534.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
df8509c2a913f393f788b7b652a0bd6994465b7afa864cd3c0cacceae2ea0fa9  kernel-3.10.0-229.11.1.el7.x86_64.rpm
43ab20c0fab9cae65be008a012e08250fba13d4fdf59f9b8ef0b0df52b9e8f5b  kernel-abi-whitelists-3.10.0-229.11.1.el7.noarch.rpm
ecf690b4fa13da560035f968d0d2ae1a0ab37993c53f42d8b5acf0f683f54cf3  kernel-debug-3.10.0-229.11.1.el7.x86_64.rpm
a43202fd8cd943d6c839ef53787fbc0d78f2c90cf7d305c29040e1856edd141f  kernel-debug-devel-3.10.0-229.11.1.el7.x86_64.rpm
d6942959c82870dcf1f89be9866203b77ad646ffa39f18e2c80bc8eaf7634f9e  kernel-devel-3.10.0-229.11.1.el7.x86_64.rpm
35d2cc4d3d58189ecf92c46770083e0dd31f96b9509292f75d48840db3ae4fec  kernel-doc-3.10.0-229.11.1.el7.noarch.rpm
6c8598490f3a7d994a9c787cc2087b69b5bfd2b2950c98127ccfed791821b0d2  kernel-headers-3.10.0-229.11.1.el7.x86_64.rpm
e0e8e6377d294ebe1fd477c2a024a1e3d54155fb9139570eed7eacac92333a27  kernel-tools-3.10.0-229.11.1.el7.x86_64.rpm
25a9611437634ea3d52e3b884b977dd465f15a7642269250a5ae6c5ae6e7de4b  kernel-tools-libs-3.10.0-229.11.1.el7.x86_64.rpm
bbb772c8a3e61afd57c5b97635a457e53bfc3d0b95ba5c8208b27739683d7f1e  kernel-tools-libs-devel-3.10.0-229.11.1.el7.x86_64.rpm
be250103a6849432a6f712fdbe2e0cd14cb5fecc06af52a258d68022bd70a3f7  perf-3.10.0-229.11.1.el7.x86_64.rpm
a1e5adeb41fc7a8a0aebdf6cec1c260edaf2b31ec5f044330ae798fb4b57822e  python-perf-3.10.0-229.11.1.el7.x86_64.rpm

Source:
a5bf3557362921672d793693137269cd5f361152ef7976890f0b038bb797a573  kernel-3.10.0-229.11.1.el7.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC