CVE-2015-7884
Ubuntu Security Notice USN-2843-2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
La función vivid_fb_ioctl en drivers/media/platform/vivid/vivid-osd.c en el kernel de Linux hasta la versión 4.3.3 no inicializa cierto miembro de estructura, lo que permite a usuarios locales obtener información sensible de la memoria del kernel a través de una aplicación manipulada.
Jan Beulich discovered that the KVM svm hypervisor implementation in the Linux kernel did not properly catch Debug exceptions on AMD processors. An attacker in a guest virtual machine could use this to cause a denial of service (system crash) in the host OS. It was discovered that the ppp implementation in the Linux kernel did not ensure that certain slot numbers are valid. A local attacker with the privilege to call ioctl() on /dev/ppp could cause a denial of service (system crash). Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-10-21 CVE Reserved
- 2015-12-17 CVE Published
- 2024-08-06 CVE Updated
- 2025-06-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=eda98796aff0d9bf41094b06811f5def3b4c333c | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2015/10/21/8 | Mailing List |
|
http://www.securityfocus.com/bid/77317 | Vdb Entry | |
http://www.securitytracker.com/id/1034893 | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=1274726 | X_refsource_confirm | |
https://github.com/torvalds/linux/commit/eda98796aff0d9bf41094b06811f5def3b4c333c | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2842-1 | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2842-2 | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2843-1 | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2843-2 | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2843-3 | 2016-12-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 4.3.2 Search vendor "Linux" for product "Linux Kernel" and version " <= 4.3.2" | - |
Affected
|