Fixed
Created: Jun 15, 2015
Updated: Mar 11, 2016
Resolved Date: Jun 16, 2015
Previous ID: LIN4-32781
Found In Version: 5.0.1
Fix Version: 6.0.0.20
Severity: Standard
Applicable for: Wind River Linux 5
Component/s: Kernel
It was found that the Linux kernel's ping socket implementation didn't properly
handle socket unhashing during spurious disconnects which could lead to
use-after-free flaw.
On x86-64 architecture systems, a local user able to create ping sockets could
use this flaw to crash the system.
On non-x86-64 architecture systems, a local user able to create ping sockets
could use this flaw to increase their privileges on the system.
Note: By default ping sockets are disabled on the system
(net.ipv4.ping_group_range = 1 0) and have to be explicitly enabled by the
system administrator for specific user groups in order to exploit this issue.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3636