First published: Tue Mar 17 2015(Updated: )
A flaw was found in the way pipe_iov_copy_from_user() and pipe_iov_copy_to_user() functions handled iovecs remaining len accounting on failed atomic access. An unprivileged local user could this flaw to crash the system or, potentially, escalate their privileges on the system. Upstream fixes: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f0d1bec9d58d4c038d0ac958c9af82be6eb18045">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f0d1bec9d58d4c038d0ac958c9af82be6eb18045</a> <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=637b58c2887e5e57850865839cc75f59184b23d1">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=637b58c2887e5e57850865839cc75f59184b23d1</a> Acknowledgements: The security impact of this issue was discovered by Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =4.4.3 | |
Google Android | =5.0.1 | |
Google Android | =5.1 | |
Google Android | =5.1.1 | |
Google Android | =6.0 | |
Linux Kernel | <=3.15.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1805 is classified as a high severity vulnerability due to its potential to allow local privilege escalation or system crashes.
To fix CVE-2015-1805, upgrade to the patched versions of the Linux kernel or Android OS specified by the vendors.
CVE-2015-1805 affects unprivileged local users on systems running vulnerable versions of the Linux kernel and specific versions of Android.
CVE-2015-1805 impacts both Linux operating systems and Google Android versions 4.4.3 to 6.0.
Yes, CVE-2015-1805 can potentially allow an attacker to escalate their privileges and gain unauthorized access to the system.