Advisories ยป MGASA-2015-0450

Updated kernel packages fix security vulnerabilities

Publication date: 19 Nov 2015
Type: security
Affected Mageia releases : 5
CVE: CVE-2015-5156 , CVE-2015-5307 , CVE-2015-8104

Description

This kernel update is based on upstream 4.1.13 longterm kernel and fixes
the following security issues:

The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel
before 4.2 attempts to support a FRAGLIST feature without proper memory
allocation, which allows guest OS users to cause a denial of service (buffer
overflow and memory corruption) via a crafted sequence of fragmented packets.
(CVE-2015-5156)

A guest to host DoS issue was found affecting various hypervisors. In that,
a guest can DoS the host by triggering an infinite stream of "alignment
check" (#AC) exceptions. This causes the microcode to enter an infinite loop
where the core never receives another interrupt. The host kernel panics due
to this effect (CVE-2015-5307).

A guest to host DoS issue was found affecting various hypervisors. In that,
a guest can DoS the host by triggering an infinite stream of "debug check"
(#DB) exceptions. This causes the microcode to enter an infinite loop where
the core never receives another interrupt. The host kernel panics due to
this effect (CVE-2015-8104).

For other fixes in this update, see the referenced changelog.
                

References

SRPMS

5/nonfree

5/core