First published: Mon Oct 05 2015(Updated: )
Dmitry Vyukov discovered that the Linux kernel did not properly initialize IPC object state in certain situations. A local attacker could use this to escalate their privileges, expose confidential information, or cause a denial of service (system crash).
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.19.0-30-powerpc64-smp | <3.19.0-30.34 | 3.19.0-30.34 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-generic | <3.19.0-30.34 | 3.19.0-30.34 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-powerpc64-emb | <3.19.0-30.34 | 3.19.0-30.34 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-powerpc-smp | <3.19.0-30.34 | 3.19.0-30.34 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-generic-lpae | <3.19.0-30.34 | 3.19.0-30.34 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-lowlatency | <3.19.0-30.34 | 3.19.0-30.34 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-powerpc-e500mc | <3.19.0-30.34 | 3.19.0-30.34 |
=15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in USN-2762-1 is a Linux kernel vulnerability that allows a local attacker to escalate privileges, expose confidential information, or cause a denial of service (system crash).
The Linux kernel vulnerability in USN-2762-1 occurs due to improper initialization of IPC object state in certain situations.
The software versions affected by USN-2762-1 are Ubuntu 15.04 with Linux kernel version 3.19.0-30.34.
The Linux kernel vulnerability in USN-2762-1 can be exploited by a local attacker to escalate privileges, expose confidential information, or cause a denial of service (system crash).
More information about USN-2762-1 can be found at the following references: [Link 1](https://ubuntu.com/security/CVE-2015-7613), [Link 2](https://ubuntu.com/security/notices/USN-2761-1), [Link 3](https://ubuntu.com/security/notices/USN-2796-1)