First published: Mon Feb 23 2015(Updated: )
A flaw was found in the method that the linux kernel handles userspace configuration of of the the Linux kernel's logical link control (LLC) implementation system settings. The incorrect handling allowed a trusted user to set multiple LLC syscalls with specially formatted data. Reading from these files also returned data from other sysctl settings that would be exposed via the same permissions to this user. This bug provides little risk to users as the values that can be modified are exposed via proc sysctls with the same permissions. Upstream patch: <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux Enterprise Server | =10-sp4 | |
Linux kernel | <=3.18.7 | |
Debian | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2041 has been classified as medium severity due to its potential for user privilege escalation.
To fix CVE-2015-2041, upgrade the Linux kernel to a version that includes the security patch.
CVE-2015-2041 affects various Linux kernel versions up to 3.18.7 and multiple specific Debian and SUSE versions.
Yes, CVE-2015-2041 can be exploited by a trusted local user to gain elevated privileges.
The risks of CVE-2015-2041 include potential unauthorized access and modifications to system settings by a lower-privileged user.