SB2015083103 - Buffer overflow in Linux kernel vhost driver
Published: August 31, 2015
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2015-4036)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to memory corruption within the vhost_scsi_send_evt() and vhost_scsi_make_tpg() functions in drivers/vhost/scsi.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c
- http://www.openwall.com/lists/oss-security/2015/05/13/4
- https://bugzilla.redhat.com/show_bug.cgi?id=1189864
- http://www.securityfocus.com/bid/74664
- http://www.ubuntu.com/usn/USN-2634-1
- http://www.ubuntu.com/usn/USN-2633-1
- http://www.securitytracker.com/id/1033729
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html