Korean
<< Back
VID 14203
Severity 30
Port 22
Protocol TCP
Class LSC
Detailed Description The remote system does not apply RHSA-2015-1221 which is kernel security update. The system which does not apply the update is affected by the following vulnerabilities :

- A NULL pointer dereference flaw was found in the way the Linux kernel's virtual console implementation handled reference counting when accessing pseudo-terminal device files (/dev/pts/*). A local, unprivileged attacker could use this flaw to crash the system. (CVE-2011-5321)

- It was found that the Linux kernel's ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system. (CVE-2015-3636)

- An integer overflow flaw was found in the way the Linux kernel randomized the stack for processes on certain 64-bit architecture systems, such as x86-64, causing the stack entropy to be reduced by four. (CVE-2015-1593)

- A flaw was found in the way the Linux kernel's 32-bit emulation implementation handled forking or closing of a task with an 'int80' entry. A local user could potentially use this flaw to escalate their privileges on the system. (CVE-2015-2830)

- It was found that the Linux kernel's TCP/IP protocol suite implementation for IPv6 allowed the Hop Limit value to be set to a smaller value than the default one. An attacker on a local network could use this flaw to prevent systems on that network from sending or receiving network packets. (CVE-2015-2922)

Note: This check solely relied on the Firefox RPM version of the remote system to assess this vulnerability, so this might be a false positive.

* References:
https://rhn.redhat.com/errata/RHSA-2015-1221.html
https://www.redhat.com/security/data/cve/CVE-2011-5321.html
https://www.redhat.com/security/data/cve/CVE-2015-1593.html
https://www.redhat.com/security/data/cve/CVE-2015-2830.html
https://www.redhat.com/security/data/cve/CVE-2015-2922.html
https://www.redhat.com/security/data/cve/CVE-2015-3636.html
https://access.redhat.com/articles/1506133

* Platforms Affected:
Red Hat Enterprise Linux Server (v. 6)
Recommendation Update the affected packages.
Launch the graphical update tool through
Applications -> System Tools -> Software Update

For a command line interface, use the following command to update the operating system:
# yum update

To install kernel package, use the following command:
# yum install kernel
Related URL CVE-2011-5321,CVE-2015-1593,CVE-2015-2830,CVE-2015-2922,CVE-2015-3636 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)