CVE-2015-7613
Published: 2 October 2015
Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.
From the Ubuntu security team
Dmitry Vyukov discovered that the Linux kernel did not properly initialize IPC object state in certain situations. A local attacker could use this to escalate their privileges, expose confidential information, or cause a denial of service (system crash).
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
Patches: Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 |
||
linux-armadaxp Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-aws Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-ec2 Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-flo Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-gke Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-goldfish Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-grouper Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-hwe Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-linaro-omap Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-linaro-shared Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-linaro-vexpress Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-lts-quantal Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-lts-raring Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-lts-saucy Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-lts-trusty Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-lts-wily Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-maguro Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-mako Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-manta Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-qcm-msm Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-raspi2 Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-snapdragon Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc4)
|
Notes
Author | Note |
---|---|
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7613
- https://github.com/torvalds/linux/commit/b9a532277938
- https://ubuntu.com/security/notices/USN-2764-1
- https://ubuntu.com/security/notices/USN-2763-1
- https://ubuntu.com/security/notices/USN-2761-1
- https://ubuntu.com/security/notices/USN-2762-1
- https://ubuntu.com/security/notices/USN-2765-1
- https://ubuntu.com/security/notices/USN-2792-1
- https://ubuntu.com/security/notices/USN-2796-1
- NVD
- Launchpad
- Debian