SB2015042114 - Improper input validation in Linux kernel rds
Published: April 21, 2015
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper input validation (CVE-ID: CVE-2015-2042)
The vulnerability allows a local user to read and manipulate data.
The vulnerability exists due to improper input validation error within the sizeof() function in net/rds/sysctl.c. A local user can read and manipulate data.
Remediation
Install update from vendor's website.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=db27ebb111e9f69efece08e4cb6a34ff980f8896
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
- http://www.debian.org/security/2015/dsa-3237
- http://www.openwall.com/lists/oss-security/2015/02/20/20
- http://www.securityfocus.com/bid/72730
- http://www.ubuntu.com/usn/USN-2560-1
- http://www.ubuntu.com/usn/USN-2561-1
- http://www.ubuntu.com/usn/USN-2562-1
- http://www.ubuntu.com/usn/USN-2563-1
- http://www.ubuntu.com/usn/USN-2564-1
- http://www.ubuntu.com/usn/USN-2565-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1195355
- https://github.com/torvalds/linux/commit/db27ebb111e9f69efece08e4cb6a34ff980f8896