Errata overview
Errata ID 250
Date 2015-07-20
Source package univention-kernel-image
Fixed in version 8.0.6-7.75.201507171759
Description
The Linux kernel in Univention Corporate Server 4.0 has been updated to
3.16.7-ckt11. It provides many bugfixes and fixes several vulnerabilities:
* Denial of service in the dcache in the fs layer (CVE-2014-8559)
* User namespaces can bypass group-based restrictions (CVE-2014-8989)
* Denial of service in batman-adv (CVE-2014-9428)
* TLS base address leak allows partial ASLR bypass (CVE-2014-9419)
* Denial of service in isofs (CVE-2014-9420)
* espfix can by bypassed (CVE-2014-8133)
* espfix not available for KVM paravirtualised guests (CVE-2014-8134)
* Memory corruption in garbage collector for unused security keys
  (CVE-2014-9529)
* Information leak in isofs (CVE-2014-9584)
* iptables doesn't handle SCTP rules unless the SCTP module is loaded
  (CVE-2014-8160)
* Insufficient randomisation of the vdso segment (CVE-2014-9585)
* Denial of service in packet routing (CVE-2015-1465)
* Use-after-free in SCTP (CVE-2015-1421)
* Incorrect implementation of SYSENTER emulation (CVE-2015-0239)
* Crypto userspace API allows loading of arbitrary kernel modules
  (CVE-2013-7421, CVE-2014-9644)
* ecryptfs 1-byte overwrite (CVE-2014-9683)
* ASLR integer overflow: Reducing stack entropy by four (CVE-2015-1593)
* Memory leak to userspace due to incorrect data type in
  rds_sysctl_rds_table (CVE-2015-2042)
* Memory leak to userspace due to incorrect data type in
  llc2_timeout_table (CVE-2015-2041)
* Xen: Non-maskable interrupts triggerable by guests (CVE-2015-2150)
* Linux mishandles int80 fork from 64-bit tasks (CVE-2015-2830)
* Buffer overruns in Linux kernel RFC4106 implementation using AESNI
  (CVE-2015-3331)
* TCP Fast Open local DoS (CVE-2015-3332)
* chown() was racy relative to execve() (CVE-2015-3339)
* infiniband: uverbs: unprotected physical memory access (CVE-2014-8159)
* btrfs: non-atomic xattr replace operation (CVE-2014-9710)
* DoS -- OOPS NULL pointer dereference in nf_nat_setup_info+0x471
  (CVE-2014-9715)
* Ext4: fallocate zero range page size > block size (CVE-2015-0275)
* Kernel execution in the early microcode loader via crafted microcode
  (CVE-2015-2666)
* IPv6 Hop limit lowering via RA messages (CVE-2015-2922)
* privilege escalation via ping sockets due to use-after-free (CVE-2015-3636)
* drivers/vhost/scsi.c: potential memory corruption (CVE-2015-4036)
Additional notes This is the second part of the fix, which updates the meta package.
CVE ID CVE-2013-7421
CVE-2014-8133
CVE-2014-8134
CVE-2014-8159
CVE-2014-8160
CVE-2014-8559
CVE-2014-8989
CVE-2014-9419
CVE-2014-9420
CVE-2014-9428
CVE-2014-9529
CVE-2014-9584
CVE-2014-9585
CVE-2014-9644
CVE-2014-9683
CVE-2014-9710
CVE-2014-9715
CVE-2015-0239
CVE-2015-0275
CVE-2015-1421
CVE-2015-1465
CVE-2015-1593
CVE-2015-2041
CVE-2015-2042
CVE-2015-2150
CVE-2015-2666
CVE-2015-2830
CVE-2015-2922
CVE-2015-3331
CVE-2015-3332
CVE-2015-3339
CVE-2015-3636
CVE-2015-4036
UCS Bug number #37385