Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-7613

Опубликовано: 19 окт. 2015
Источник: debian
EPSS Низкий

Описание

Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.2.3-1package
linux-2.6removedpackage

Примечания

  • https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a532277938798b53178d5a66af6e2915cb27cf (v4.3-rc4)

EPSS

Процентиль: 33%
0.00124
Низкий

Связанные уязвимости

ubuntu
больше 9 лет назад

Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.

redhat
больше 9 лет назад

Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.

nvd
больше 9 лет назад

Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.

github
около 3 лет назад

Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.

suse-cvrf
больше 9 лет назад

Security update for Linux Kernel Live Patch 2

EPSS

Процентиль: 33%
0.00124
Низкий