First published: Wed Dec 09 2015(Updated: )
A NULL pointer dereference flaw was found in the way the Linux kernel's network subsystem handled socket creation with an invalid protocol identifier. A local user could use this flaw to crash the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-642.el6 | 0:2.6.32-642.el6 |
redhat/kernel-rt | <0:3.10.0-514.rt56.420.el7 | 0:3.10.0-514.rt56.420.el7 |
redhat/kernel | <0:3.10.0-514.el7 | 0:3.10.0-514.el7 |
Linux Kernel | <3.2.75 | |
Linux Kernel | >=3.3<3.4.111 | |
Linux Kernel | >=3.5<3.10.95 | |
Linux Kernel | >=3.11<3.12.52 | |
Linux Kernel | >=3.13<3.14.59 | |
Linux Kernel | >=3.15<3.16.35 | |
Linux Kernel | >=3.17<3.18.26 | |
Linux Kernel | >=3.19<4.1.16 | |
Linux Kernel | >=4.2<4.3.4 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2015-8543 is a vulnerability in the Linux kernel's network subsystem that allows local users to cause a denial of service or possibly gain privileges.
The Linux kernel through version 4.3.3, as used in Android and other products, is affected.
CVE-2015-8543 has a severity rating of medium.
CVE-2015-8543 can be exploited by local users to cause a denial of service or possibly gain privileges.
Yes, the recommended remedy for CVE-2015-8543 is to update to Linux kernel version 4.4~.