Fedora 21 update for kernel



| Updated: 2025-04-24
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2015-8104
CVE-2015-5307
CVE-2015-7990
CVE-2015-7799
CWE-ID CWE-703
CWE-476
CWE-20
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Fedora
Operating systems & Components / Operating system

kernel
Operating systems & Components / Operating system package or component

Vendor Fedoraproject

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Improper check or handling of exceptional conditions

EUVDB-ID: #VU3002

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2015-8104

CWE-ID: CWE-703 - Improper Check or Handling of Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The weakness exists in the KVM subsystem due to many #DB (aka Debug) exceptions, related to svm.c. An adjacent attacker can cause the service to crash.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 21

kernel: before 4.1.13-100.fc21

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2015-f2c534bc12


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper check or handling of exceptional conditions

EUVDB-ID: #VU3355

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2015-5307

CWE-ID: CWE-703 - Improper Check or Handling of Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The weakness exists in the KVM subsystem due to many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c. An adjacent attacker can cause the service to crash.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 21

kernel: before 4.1.13-100.fc21

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2015-f2c534bc12


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU90693

Risk: Low

CVSSv4.0: 2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2015-7990

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to read and manipulate data.

The vulnerability exists due to NULL pointer dereference within the rds_sendmsg() function in net/rds/send.c, within the __rds_conn_create() function in net/rds/connection.c. A local user can read and manipulate data.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 21

kernel: before 4.1.13-100.fc21

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2015-f2c534bc12


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

EUVDB-ID: #VU33641

Risk: Medium

CVSSv4.0: 4.6 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2015-7799

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows local users to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 21

kernel: before 4.1.13-100.fc21

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2015-f2c534bc12


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###