First published: Tue Aug 04 2015(Updated: )
A flaw was found in the Linux kernels function path_openat() in which would incorrectly clear up twice (as part of path_lookupat() called by do_tmpfile(). Doing so again can lead to double fput(). This can lead to a use-after free condition. CVE assignment: <a href="http://seclists.org/oss-sec/2015/q3/270">http://seclists.org/oss-sec/2015/q3/270</a> Introduced in this commit: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bb458c644a59dbba3a1fe59b27106c5e68e1c4bd">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bb458c644a59dbba3a1fe59b27106c5e68e1c4bd</a> Upstream patch: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f15133df088ecadd141ea1907f2c96df67c729f0">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f15133df088ecadd141ea1907f2c96df67c729f0</a> OSS-SEC request: <a href="http://seclists.org/oss-sec/2015/q3/371">http://seclists.org/oss-sec/2015/q3/371</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=3.0<=3.19.8 | |
Linux kernel | >=4.0<4.0.4 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Debian | =7.0 | |
Debian | =8.0 | |
Android | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5706 is classified as a moderate severity vulnerability due to its potential to cause a use-after-free condition.
CVE-2015-5706 affects certain versions of the Linux kernel and specific distributions of Android and Ubuntu.
To fix CVE-2015-5706, update the Linux kernel to version 5.10.223-1 or later, or apply the relevant patches for affected distributions.
CVE-2015-5706 is a use-after-free vulnerability that arises from improper memory management in the Linux kernel.
Exploiting CVE-2015-5706 could lead to local privilege escalation and potentially allow an attacker to execute arbitrary code.