CVE-2015-8543

The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79462ad02e861803b3840cc782248c7359451cd9 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0855.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2574.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2584.html Third Party Advisory
http://www.debian.org/security/2015/dsa-3426 Third Party Advisory
http://www.debian.org/security/2016/dsa-3434 Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/12/09/5 Mailing List Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html Third Party Advisory
http://www.securityfocus.com/bid/79698 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034892 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2886-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2888-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2890-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2890-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2890-3 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1290475 Issue Tracking Third Party Advisory
https://github.com/torvalds/linux/commit/79462ad02e861803b3840cc782248c7359451cd9 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

07 Jun 2023, 12:47

Type Values Removed Values Added
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1290475 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1290475 - Issue Tracking, Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-2890-3 - (UBUNTU) http://www.ubuntu.com/usn/USN-2890-3 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-2886-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-2886-1 - Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id/1034892 - (SECTRACK) http://www.securitytracker.com/id/1034892 - Third Party Advisory, VDB Entry
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html - Mailing List, Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-0855.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-0855.html - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html - Mailing List, Third Party Advisory
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2574.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2574.html - Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2584.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2584.html - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/79698 - (BID) http://www.securityfocus.com/bid/79698 - Third Party Advisory, VDB Entry
References (MLIST) http://www.openwall.com/lists/oss-security/2015/12/09/5 - (MLIST) http://www.openwall.com/lists/oss-security/2015/12/09/5 - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html - Mailing List, Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-2890-2 - (UBUNTU) http://www.ubuntu.com/usn/USN-2890-2 - Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2016/dsa-3434 - (DEBIAN) http://www.debian.org/security/2016/dsa-3434 - Third Party Advisory
References (CONFIRM) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79462ad02e861803b3840cc782248c7359451cd9 - (CONFIRM) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79462ad02e861803b3840cc782248c7359451cd9 - Vendor Advisory
References (DEBIAN) http://www.debian.org/security/2015/dsa-3426 - (DEBIAN) http://www.debian.org/security/2015/dsa-3426 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-2888-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-2888-1 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-2890-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-2890-1 - Third Party Advisory
References (CONFIRM) https://github.com/torvalds/linux/commit/79462ad02e861803b3840cc782248c7359451cd9 - (CONFIRM) https://github.com/torvalds/linux/commit/79462ad02e861803b3840cc782248c7359451cd9 - Vendor Advisory

Information

Published : 2015-12-28 11:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-8543

Mitre link : CVE-2015-8543

CVE.ORG link : CVE-2015-8543


JSON object : View

Products Affected

linux

  • linux_kernel