[security-announce] Kernel (linux-hierofalcon 3.19): Security Update

Sona Sarmadi sona.sarmadi at enea.com
Tue Jan 5 15:40:36 CET 2016


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

	Enea Linux Security Advisory

=========================================================
Product/package: kernel (linux-hierofalcon 3.19)
Severity: Low, Medium
CVE Name: CVE-2015-2922, CVE-2015-3636
Layer: meta-hierofalcon
=========================================================

This patch fixes CVE-2015-2922 and CVE-2015-3636 in the
linux-hierofalcon kernel version 3.19.

Statement:
CVE-2015-2922 does not affect the linux-hierofalcon kernel version 4.1.
CVE-2015-3636 has already been fixed in the linux-hierofalcon kernel
version 4.1.

Description
===========
CVE-2015-2922 (Low)
The ndisc_router_discovery function in net/ipv6/ndisc.c in the
Neighbor Discovery (ND) protocol implementation in the IPv6 stack in
the Linux kernel before 3.19.6 allows remote attackers to reconfigure
a hop-limit setting via a small hop_limit value in a Router
Advertisement (RA) message.

CVE-2015-3636 (Medium)
The ping_unhash function in net/ipv4/ping.c in the Linux kernel before
4.0.3 does not initialize a certain list data structure during an
unhash operation, which allows local users to gain privileges or cause
a denial of service (use-after-free and system crash) by leveraging
the ability to make a SOCK_DGRAM socket system call for the
IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect
system call after a disconnect.

References:
===========
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2922
http://www.openwall.com/lists/oss-security/2015/04/04/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3636
http://www.openwall.com/lists/oss-security/2015/05/02/5

Upstream/original fix (CVE-2015-2922):
=====================================
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
patch/?id=c85b2d7e9fa44286feaac33031db1dd0e4c9ed3b

Correction for Enea Linux for (CVE-2015-2922)
=============================================
http://git.enea.com/cgit/linux/meta-hierofalcon.git/patch/?id=a63ce710f8
d26ad6732602a743ff346a656efb27


Upstream/original fix (CVE-2015-3636):
=====================================
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
patch/?id=e13f6f2b39c4d91371c0ede88b136f364a6ffd6d

Correction for Enea Linux for (CVE-2015-3636)
=============================================
http://git.enea.com/cgit/linux/meta-hierofalcon.git/patch/?id=a7516bc90a
45e8f16f9a83e0abbb420447150984

How to get the latest patches
=============================
 - If you have already cloned meta-enea, update it to get new security
patches.

cd Enea-Linux-5.0/poky/meta-hierofalcon
git pull

 - If you have not yet cloned needed repositories, do it as described
below. (Security patches are fetched implicitly when cloning the repos).

mkdir Enea-Linux-5.0
git -C Enea-Linux-5.0 clone -b dizzy git://git.enea.com/linux/poky.git
POKY=Enea-Linux-5.0/poky
git -C $POKY clone -b dizzy git://git.enea.com/linux/meta-enea.git
git -C $POKY clone -b dizzy git://git.enea.com/linux/meta-
hierofalcon.git
git -C $POKY clone -b dizzy git://git.enea.com/linux/meta-linaro.git
git -C $POKY clone -b dizzy git://git.enea.com/linux/meta-
openembedded.git
git -C $POKY clone -b
dizzygit://git.enea.com/linux/meta-virtualization.git
git -C $POKY/meta-enea clone -b dizzy
git://git.enea.com/linux/meta-enea/meta-vt.git


If you have any questions regarding the security patches and security
updates please contact security at enea.com.

Enea Security Team
Sona Sarmadi
Mobile: +46 70 971 4475
www.enea.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=kMLw
-----END PGP SIGNATURE-----



More information about the security-announce mailing list