Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-1805

Опубликовано: 02 июн. 2015
Источник: redhat
CVSS2: 6.9

Описание

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."

It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

Отчет

This issue does affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and 7, and Red Hat Enterprise MRG 2. Future Linux kernel updates for the respective releases will address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux Extended Update Support 5.6kernelAffected
Red Hat Enterprise Linux 5kernelFixedRHSA-2015:104202.06.2015
Red Hat Enterprise Linux 5.6 Long LifekernelFixedRHSA-2015:119025.06.2015
Red Hat Enterprise Linux 5.9 Long LifekernelFixedRHSA-2015:112016.06.2015
Red Hat Enterprise Linux 6kernelFixedRHSA-2015:108109.06.2015
Red Hat Enterprise Linux 6.2 Advanced Update SupportkernelFixedRHSA-2015:108209.06.2015
Red Hat Enterprise Linux 6.4 Advanced Update SupportkernelFixedRHSA-2015:121107.07.2015
Red Hat Enterprise Linux 6.5 Extended Update SupportkernelFixedRHSA-2015:119930.06.2015
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2015:113923.06.2015
Red Hat Enterprise Linux 7kernelFixedRHSA-2015:113723.06.2015

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1202855kernel: pipe: iovec overrun leading to memory corruption

6.9 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 10 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."

nvd
почти 10 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."

debian
почти 10 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in t ...

github
около 3 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."

oracle-oval
около 10 лет назад

ELSA-2015-1042: kernel security and bug fix update (IMPORTANT)

6.9 Medium

CVSS2