The kernel-rt packages is susceptible to denial of service (DoS). The attack is possible because it does not make sure the addr_len
value to get initialized with the associated data structure, allowing a local unauthorized user to do the recvmsg
, recvfrom
, and recvmmsg
system calls to leak kernel stack memory to user space.
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bceaa90240b6019ed73b49965eac7d167610be69
lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
rhn.redhat.com/errata/RHSA-2014-0159.html
rhn.redhat.com/errata/RHSA-2014-0285.html
seclists.org/oss-sec/2014/q1/29
secunia.com/advisories/55882
secunia.com/advisories/56036
www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
www.openwall.com/lists/oss-security/2013/11/28/13
www.ubuntu.com/usn/USN-2107-1
www.ubuntu.com/usn/USN-2108-1
www.ubuntu.com/usn/USN-2109-1
www.ubuntu.com/usn/USN-2110-1
www.ubuntu.com/usn/USN-2113-1
www.ubuntu.com/usn/USN-2117-1
www.ubuntu.com/usn/USN-2135-1
www.ubuntu.com/usn/USN-2136-1
www.ubuntu.com/usn/USN-2138-1
www.ubuntu.com/usn/USN-2139-1
www.ubuntu.com/usn/USN-2141-1
access.redhat.com/security/updates/classification/#important
access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/index.html
bugzilla.redhat.com/show_bug.cgi?id=1016735
bugzilla.redhat.com/show_bug.cgi?id=1032245
bugzilla.redhat.com/show_bug.cgi?id=1035875
bugzilla.redhat.com/show_bug.cgi?id=1058848
bugzilla.redhat.com/show_bug.cgi?id=1067880
github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
rhn.redhat.com/errata/RHSA-2014-0439.html