Wind River Support Network

HomeDefectsLIN6-9956
Fixed

LIN6-9956 : Security Advisory - linux - CVE-2015-3636

Created: Jun 1, 2015    Updated: Dec 3, 2018
Resolved Date: Jul 8, 2015
Previous ID: LIN4-32696
Found In Version: 6.0.0.20
Fix Version: 6.0.0.23
Severity: Standard
Applicable for: Wind River Linux 6
Component/s: Kernel

Description

It was found that the Linux kernel's ping socket implementation didn't properly
handle socket unhashing during spurious disconnects which could lead to
use-after-free flaw.

On x86-64 architecture systems, a local user able to create ping sockets could
use this flaw to crash the system.

On non-x86-64 architecture systems, a local user able to create ping sockets
could use this flaw to increase their privileges on the system.

Note: By default ping sockets are disabled on the system
(net.ipv4.ping_group_range = 1	0) and have to be explicitly enabled by the
system administrator for specific user groups in order to exploit this issue.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3636

Other Downloads


Live chat
Online