CVE-2015-6252

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.

References

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5

http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html

http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html

http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html

http://www.debian.org/security/2015/dsa-3364

http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.5

http://www.openwall.com/lists/oss-security/2015/08/18/3

http://www.securityfocus.com/bid/76400

http://www.securitytracker.com/id/1033666

http://www.ubuntu.com/usn/USN-2748-1

http://www.ubuntu.com/usn/USN-2749-1

http://www.ubuntu.com/usn/USN-2751-1

http://www.ubuntu.com/usn/USN-2752-1

http://www.ubuntu.com/usn/USN-2759-1

http://www.ubuntu.com/usn/USN-2760-1

http://www.ubuntu.com/usn/USN-2777-1

https://bugzilla.redhat.com/show_bug.cgi?id=1251839

https://github.com/torvalds/linux/commit/7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5

Details

Source: MITRE

Published: 2015-10-19

Updated: 2017-11-04

Type: CWE-399

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 4.1.4 (inclusive)

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
124984EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1531)NessusHuawei Local Security Checks
high
124812EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1488)NessusHuawei Local Security Checks
medium
100238OracleVM 3.2 : Unbreakable / etc (OVMSA-2017-0106)NessusOracleVM Local Security Checks
critical
100237OracleVM 3.3 : Unbreakable / etc (OVMSA-2017-0105)NessusOracleVM Local Security Checks
critical
100235Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2017-3567)NessusOracle Linux Local Security Checks
critical
100234Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2017-3566)NessusOracle Linux Local Security Checks
critical
93289SUSE SLES11 Security Update : kernel (SUSE-SU-2016:2074-1)NessusSuSE Local Security Checks
critical
87104SUSE SLED11 / SLES11 Security Update : kernel (SUSE-SU-2015:2108-1)NessusSuSE Local Security Checks
medium
86468Ubuntu 14.04 LTS : linux-lts-utopic vulnerabilities (USN-2777-1)NessusUbuntu Local Security Checks
medium
86378SUSE SLED12 / SLES12 Security Update : kernel-source (SUSE-SU-2015:1727-1)NessusSuSE Local Security Checks
high
86290SUSE SLED11 / SLES11 Security Update : kernel-source (SUSE-SU-2015:1678-1)NessusSuSE Local Security Checks
high
86244Ubuntu 12.04 LTS : linux vulnerabilities (USN-2759-1)NessusUbuntu Local Security Checks
medium
86207Ubuntu 15.04 : linux vulnerabilities (USN-2752-1)NessusUbuntu Local Security Checks
low
86206Ubuntu 14.04 LTS : linux-lts-vivid vulnerabilities (USN-2751-1)NessusUbuntu Local Security Checks
low
86204Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-2749-1)NessusUbuntu Local Security Checks
low
86190Ubuntu 14.04 LTS : linux vulnerabilities (USN-2748-1)NessusUbuntu Local Security Checks
low
86050Debian DSA-3364-1 : linux - security updateNessusDebian Local Security Checks
medium