Your submission was sent successfully! Close

CVE-2015-1805

Published: 03 June 2015

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."

From the Ubuntu security team

A flaw was discovered in the user space memory copying for the pipe iovecs in the Linux kernel. An unprivileged local user could exploit this flaw to cause a denial of service (system crash) or potentially escalate their privileges.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by f0d1bec9d58d4c038d0ac958c9af82be6eb18045
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 637b58c2887e5e57850865839cc75f59184b23d1
linux-2.6
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc1)