The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Linux Kernel Subscribe
Enterprise Linux Subscribe
Enterprise Mrg Subscribe
Rhel Aus Subscribe
Rhel Eus Subscribe
Rhel Extras Rt Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-3290-1 linux security update
EUVD EUVD EUVD-2015-3674 The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.
Ubuntu USN Ubuntu USN USN-2631-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-2632-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-2633-1 Linux kernel (Trusty HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-2634-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-2635-1 Linux kernel (Utopic HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-2636-1 Linux kernel (Vivid HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-2637-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-2638-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a134f083e79fb4c3d0a925691e732c56911b4326 cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157788.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157897.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158804.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1221.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1534.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1564.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1583.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1643.html cve-icon cve-icon
http://www.debian.org/security/2015/dsa-3290 cve-icon cve-icon
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2015/05/02/5 cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html cve-icon cve-icon
http://www.securityfocus.com/bid/74450 cve-icon cve-icon
http://www.securitytracker.com/id/1033186 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2631-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2632-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2633-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2634-1 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1218074 cve-icon cve-icon
https://github.com/torvalds/linux/commit/a134f083e79fb4c3d0a925691e732c56911b4326 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2015-3636 cve-icon
https://www.cve.org/CVERecord?id=CVE-2015-3636 cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T05:47:57.772Z

Reserved: 2015-05-02T00:00:00.000Z

Link: CVE-2015-3636

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-08-06T01:59:00.130

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-3636

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-05-02T00:00:00Z

Links: CVE-2015-3636 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses