// For flags

CVE-2015-1805

kernel: pipe: iovec overrun leading to memory corruption

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."

Vulnerabilidad en las implementaciones (1) pipe_read y (2) pipe_write en fs/pipe.c en el kernel de Linux en versiones anteriores a 3.16, no considera correctamente los efectos secundarios de llamadas __copy_to_user_inatomic y __copy_from_user_inatomic fallidas, lo que permite a usuarios locales provocar una denegación de servicio (caída del sistema) o posiblemente obtener privilegios a través de una aplicación manipulada, también conocida como una 'saturación del array del vector I/O'.

It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-02-17 CVE Reserved
  • 2015-06-02 CVE Published
  • 2016-04-20 First Exploit
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-17: DEPRECATED: Code
CAPEC
References (39)
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2015-1042.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2015-1081.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2015-1082.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2015-1120.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2015-1137.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2015-1138.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2015-1190.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2015-1199.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2015-1211.html 2018-01-05
http://www.debian.org/security/2015/dsa-3290 2018-01-05
http://www.ubuntu.com/usn/USN-2679-1 2018-01-05
http://www.ubuntu.com/usn/USN-2680-1 2018-01-05
http://www.ubuntu.com/usn/USN-2681-1 2018-01-05
http://www.ubuntu.com/usn/USN-2967-1 2018-01-05
http://www.ubuntu.com/usn/USN-2967-2 2018-01-05
https://bugzilla.redhat.com/show_bug.cgi?id=1202855 2015-07-07
https://access.redhat.com/security/cve/CVE-2015-1805 2015-07-07
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.4.3
Search vendor "Google" for product "Android" and version "4.4.3"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
5.0.1
Search vendor "Google" for product "Android" and version "5.0.1"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
5.1
Search vendor "Google" for product "Android" and version "5.1"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
5.1.1
Search vendor "Google" for product "Android" and version "5.1.1"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
6.0
Search vendor "Google" for product "Android" and version "6.0"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
<= 3.15.10
Search vendor "Linux" for product "Linux Kernel" and version " <= 3.15.10"
-
Affected