First published: Mon May 04 2015(Updated: )
It was found that the Linux kernel's ping socket implementation didn't properly handle socket unhashing during spurious disconnects which could lead to use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to increase their privileges on the system. Note: By default ping sockets are disabled on the system (net.ipv4.ping_group_range = 1 0) and have to be explicitly enabled by the system administrator for specific user groups in order to exploit this issue. Upstream fix: <a href="https://github.com/torvalds/linux/commit/a134f083e79fb4c3d0a925691e732c56911b4326">https://github.com/torvalds/linux/commit/a134f083e79fb4c3d0a925691e732c56911b4326</a> References: <a href="http://www.openwall.com/lists/oss-security/2015/05/02/5">http://www.openwall.com/lists/oss-security/2015/05/02/5</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.0.2 | |
Debian Debian Linux | =7.0 | |
Redhat Enterprise Linux | =6.0 | |
Canonical Ubuntu Linux | =12.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.