CVE-2015-7613
kernel: Unauthorized access to IPC objects with SysV shm
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.
Condición de carrera en la implementación del objeto IPC en el kernel de Linux hasta la versión 4.2.3 permite a usuarios locales obtener privilegios desencadenando una llamada a ipc_addid que conduce a comparaciones de uid y gid contra datos no inicializados, relacionada con msg.c, shm.c y util.c.
A race condition flaw was found in the way the Linux kernel's IPC subsystem initialized certain fields in an IPC object structure that were later used for permission checking before inserting the object into a globally visible list. A local, unprivileged user could potentially use this flaw to elevate their privileges on the system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-10-01 CVE Reserved
- 2015-10-06 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
- CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
References (27)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a532277938798b53178d5a66af6e2915cb27cf | X_refsource_confirm | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | X_refsource_confirm | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/76977 | Vdb Entry | |
http://www.securitytracker.com/id/1034094 | Vdb Entry | |
http://www.securitytracker.com/id/1034592 | Vdb Entry | |
https://github.com/torvalds/linux/commit/b9a532277938798b53178d5a66af6e2915cb27cf | X_refsource_confirm | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10146 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/10/01/8 | 2024-08-06 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 4.2.3 Search vendor "Linux" for product "Linux Kernel" and version " <= 4.2.3" | - |
Affected
|