CVE-2015-6937

MEDIUM

Description

The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.

References

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f

http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html

http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html

http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html

http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html

http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html

http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html

http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html

http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html

http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html

http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html

http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html

http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html

http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html

http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html

http://www.debian.org/security/2015/dsa-3364

http://www.openwall.com/lists/oss-security/2015/09/14/3

http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

http://www.securityfocus.com/bid/76767

http://www.securitytracker.com/id/1034453

http://www.ubuntu.com/usn/USN-2773-1

http://www.ubuntu.com/usn/USN-2774-1

http://www.ubuntu.com/usn/USN-2777-1

https://bugzilla.redhat.com/show_bug.cgi?id=1263139

https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f

Details

Source: MITRE

Published: 2015-10-19

Updated: 2018-10-17

Risk Information

CVSS v2.0

Base Score: 4.9

Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C)

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM