Linux » Linux Kernel : Security Vulnerabilities Published In 2015
CVE-2015-8660
Public exploit exists
The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.
| Max Base Score | 7.2 |
| Published | 2015-12-28 |
| Updated | 2023-06-07 |
| EPSS | 0.12% |
The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
| Max Base Score | 2.3 |
| Published | 2015-12-28 |
| Updated | 2017-11-04 |
| EPSS | 0.04% |
The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
| Max Base Score | 7.0 |
| Published | 2015-12-28 |
| Updated | 2023-06-07 |
| EPSS | 0.04% |
fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles compressed inline extents, which allows local users to obtain sensitive pre-truncation information from a file via a clone action.
| Max Base Score | 4.0 |
| Published | 2015-12-28 |
| Updated | 2018-01-05 |
| EPSS | 0.14% |
net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.
| Max Base Score | 5.0 |
| Published | 2015-11-16 |
| Updated | 2017-11-04 |
| EPSS | 4.32% |
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
| Max Base Score | 4.7 |
| Published | 2015-11-16 |
| Updated | 2019-02-13 |
| EPSS | 0.07% |
Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
| Max Base Score | 5.9 |
| Published | 2015-12-28 |
| Updated | 2018-10-17 |
| EPSS | 0.04% |
The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
| Max Base Score | 2.3 |
| Published | 2015-12-28 |
| Updated | 2016-12-07 |
| EPSS | 0.04% |
The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
| Max Base Score | 2.3 |
| Published | 2015-12-28 |
| Updated | 2016-12-07 |
| EPSS | 0.04% |
The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
| Max Base Score | 2.1 |
| Published | 2015-11-16 |
| Updated | 2023-02-13 |
| EPSS | 0.05% |
The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
| Max Base Score | 4.9 |
| Published | 2015-10-19 |
| Updated | 2017-03-24 |
| EPSS | 0.04% |
Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.
| Max Base Score | 6.9 |
| Published | 2015-10-19 |
| Updated | 2016-12-08 |
| EPSS | 0.04% |
fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.
| Max Base Score | 4.9 |
| Published | 2015-12-28 |
| Updated | 2023-02-13 |
| EPSS | 0.06% |
Multiple race conditions in the Advanced Union Filesystem (aufs) aufs3-mmap.patch and aufs4-mmap.patch patches for the Linux kernel 3.x and 4.x allow local users to cause a denial of service (use-after-free and BUG) or possibly gain privileges via a (1) madvise or (2) msync system call, related to mm/madvise.c and mm/msync.c.
| Max Base Score | 4.4 |
| Published | 2015-11-16 |
| Updated | 2020-08-07 |
| EPSS | 0.04% |
The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
| Max Base Score | 4.9 |
| Published | 2015-10-19 |
| Updated | 2018-10-17 |
| EPSS | 0.04% |
The perf_callchain_user_64 function in arch/powerpc/perf/callchain.c in the Linux kernel before 4.0.2 on ppc64 platforms allows local users to cause a denial of service (infinite loop) via a deep 64-bit userspace backtrace.
| Max Base Score | 4.9 |
| Published | 2015-08-31 |
| Updated | 2016-12-08 |
| EPSS | 0.04% |
The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.
| Max Base Score | 2.1 |
| Published | 2015-10-19 |
| Updated | 2017-11-04 |
| EPSS | 0.04% |
Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
| Max Base Score | 4.6 |
| Published | 2015-10-19 |
| Updated | 2020-06-02 |
| EPSS | 0.04% |
Use-after-free vulnerability in the path_openat function in fs/namei.c in the Linux kernel 3.x and 4.x before 4.0.4 allows local users to cause a denial of service or possibly have unspecified other impact via O_TMPFILE filesystem operations that leverage a duplicate cleanup operation.
| Max Base Score | 4.6 |
| Published | 2015-08-31 |
| Updated | 2020-08-13 |
| EPSS | 0.04% |
The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.
| Max Base Score | 2.1 |
| Published | 2015-08-31 |
| Updated | 2017-09-21 |
| EPSS | 0.04% |
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.
| Max Base Score | 5.0 |
| Published | 2015-08-31 |
| Updated | 2018-01-05 |
| EPSS | 44.03% |
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.
| Max Base Score | 7.8 |
| Published | 2015-08-31 |
| Updated | 2023-02-02 |
| EPSS | 25.96% |
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
| Max Base Score | 4.9 |
| Published | 2015-11-16 |
| Updated | 2023-02-12 |
| EPSS | 0.07% |
The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
| Max Base Score | 4.7 |
| Published | 2015-10-19 |
| Updated | 2023-02-13 |
| EPSS | 0.04% |
drivers/usb/serial/whiteheat.c in the Linux kernel before 4.2.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted USB device. NOTE: this ID was incorrectly used for an Apache Cordova issue that has the correct ID of CVE-2015-8320.
| Max Base Score | 4.9 |
| Published | 2015-11-16 |
| Updated | 2023-02-12 |
| EPSS | 0.24% |