Updated kernel packages fix security vulnerabilities
Publication date: 19 Nov 2015Modification date: 19 Nov 2015
Type: security
Affected Mageia releases : 5
CVE: CVE-2015-5156 , CVE-2015-5307 , CVE-2015-8104
Description
This kernel update is based on upstream 4.1.13 longterm kernel and fixes
the following security issues:
The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel
before 4.2 attempts to support a FRAGLIST feature without proper memory
allocation, which allows guest OS users to cause a denial of service (buffer
overflow and memory corruption) via a crafted sequence of fragmented packets.
(CVE-2015-5156)
A guest to host DoS issue was found affecting various hypervisors. In that,
a guest can DoS the host by triggering an infinite stream of "alignment
check" (#AC) exceptions. This causes the microcode to enter an infinite loop
where the core never receives another interrupt. The host kernel panics due
to this effect (CVE-2015-5307).
A guest to host DoS issue was found affecting various hypervisors. In that,
a guest can DoS the host by triggering an infinite stream of "debug check"
(#DB) exceptions. This causes the microcode to enter an infinite loop where
the core never receives another interrupt. The host kernel panics due to
this effect (CVE-2015-8104).
For other fixes in this update, see the referenced changelog.
References
SRPMS
5/core
- kernel-4.1.13-2.mga5
- kernel-userspace-headers-4.1.13-2.mga5
- kmod-xtables-addons-2.7-6.mga5
5/nonfree
- kmod-broadcom-wl-6.30.223.271-3.mga5.nonfree
- kmod-fglrx-15.200.1046-7.mga5.nonfree
- kmod-nvidia304-304.128-3.mga5.nonfree
- kmod-nvidia340-340.93-3.mga5.nonfree
- kmod-nvidia-current-346.96-3.mga5.nonfree