CVE-2015-7613

MEDIUM

Description

Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.

References

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a532277938798b53178d5a66af6e2915cb27cf

http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html

http://rhn.redhat.com/errata/RHSA-2015-2636.html

http://www.debian.org/security/2015/dsa-3372

http://www.openwall.com/lists/oss-security/2015/10/01/8

http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

http://www.securityfocus.com/bid/76977

http://www.securitytracker.com/id/1034094

http://www.securitytracker.com/id/1034592

http://www.ubuntu.com/usn/USN-2761-1

http://www.ubuntu.com/usn/USN-2762-1

http://www.ubuntu.com/usn/USN-2763-1

http://www.ubuntu.com/usn/USN-2764-1

http://www.ubuntu.com/usn/USN-2765-1

http://www.ubuntu.com/usn/USN-2792-1

https://bugzilla.redhat.com/show_bug.cgi?id=1268270

https://github.com/torvalds/linux/commit/b9a532277938798b53178d5a66af6e2915cb27cf

https://kc.mcafee.com/corporate/index?page=content&id=SB10146

Details

Source: MITRE

Published: 2015-10-19

Updated: 2016-12-08

Type: CWE-362

Risk Information

CVSS v2.0

Base Score: 6.9

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.4

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 4.2.3 (inclusive)

Tenable Plugins

View all (33 total)

IDNameProductFamilySeverity
124986EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1533)NessusHuawei Local Security Checks
high
124812EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1488)NessusHuawei Local Security Checks
high
99781EulerOS 2.0 SP1 : kernel (EulerOS-SA-2016-1018)NessusHuawei Local Security Checks
medium
99163OracleVM 3.3 : Unbreakable / etc (OVMSA-2017-0057) (Dirty COW)NessusOracleVM Local Security Checks
critical
90019OracleVM 3.2 : kernel-uek (OVMSA-2016-0037)NessusOracleVM Local Security Checks
critical
89435Fedora 22 : kernel-4.1.10-200.fc22 (2015-dcc260f2f2)NessusFedora Local Security Checks
medium
89427Fedora 21 : kernel-4.1.10-100.fc21 (2015-d7e074ba30)NessusFedora Local Security Checks
medium
89222Fedora 23 : kernel-4.2.3-300.fc23 (2015-43145298f4)NessusFedora Local Security Checks
medium
88572RHEL 7 : kernel (RHSA-2015:2587)NessusRed Hat Local Security Checks
medium
88571RHEL 7 : kernel-rt (RHSA-2015:2411)NessusRed Hat Local Security Checks
medium
87836Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2016-3503)NessusOracle Linux Local Security Checks
medium
87835Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2016-3502)NessusOracle Linux Local Security Checks
medium
87559Scientific Linux Security Update : kernel on SL7.x x86_64 (20151119)NessusScientific Linux Local Security Checks
medium
87436F5 Networks BIG-IP : Linux kernel vulnerability (K90230486)NessusF5 Networks Local Security Checks
medium
87403Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20151215)NessusScientific Linux Local Security Checks
medium
87398RHEL 6 : kernel (RHSA-2015:2636)NessusRed Hat Local Security Checks
medium
87396Oracle Linux 6 : kernel (ELSA-2015-2636)NessusOracle Linux Local Security Checks
medium
87381CentOS 6 : kernel (CESA-2015:2636)NessusCentOS Local Security Checks
medium
87167OracleVM 3.3 : kernel-uek (OVMSA-2015-0150)NessusOracleVM Local Security Checks
medium
87135CentOS 7 : kernel (CESA-2015:2152)NessusCentOS Local Security Checks
high
87098Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2015-3101)NessusOracle Linux Local Security Checks
medium
87090Oracle Linux 7 : kernel (ELSA-2015-2152)NessusOracle Linux Local Security Checks
high
86972RHEL 7 : kernel (RHSA-2015:2152)NessusRed Hat Local Security Checks
high
86783Ubuntu 12.04 LTS : linux vulnerabilities (USN-2792-1)NessusUbuntu Local Security Checks
medium
86634Amazon Linux AMI : kernel (ALAS-2015-603)NessusAmazon Linux Local Security Checks
critical
86378SUSE SLED12 / SLES12 Security Update : kernel-source (SUSE-SU-2015:1727-1)NessusSuSE Local Security Checks
high
86375Debian DSA-3372-1 : linux - security updateNessusDebian Local Security Checks
medium
86357Debian DLA-325-1 : linux-2.6 security updateNessusDebian Local Security Checks
medium
86299Ubuntu 14.04 LTS : linux-lts-vivid vulnerability (USN-2765-1)NessusUbuntu Local Security Checks
medium
86298Ubuntu 14.04 LTS : linux-lts-utopic vulnerability (USN-2764-1)NessusUbuntu Local Security Checks
medium
86297Ubuntu 12.04 LTS : linux-lts-trusty vulnerability (USN-2763-1)NessusUbuntu Local Security Checks
medium
86296Ubuntu 15.04 : linux vulnerability (USN-2762-1)NessusUbuntu Local Security Checks
medium
86295Ubuntu 14.04 LTS : linux vulnerability (USN-2761-1)NessusUbuntu Local Security Checks
medium