Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.
References
Link Providers
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a532277938798b53178d5a66af6e2915cb27cf cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-2636.html cve-icon cve-icon
http://www.debian.org/security/2015/dsa-3372 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2015/10/01/8 cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html cve-icon cve-icon
http://www.securityfocus.com/bid/76977 cve-icon cve-icon
http://www.securitytracker.com/id/1034094 cve-icon cve-icon
http://www.securitytracker.com/id/1034592 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2761-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2762-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2763-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2764-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2765-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2792-1 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1268270 cve-icon cve-icon
https://github.com/torvalds/linux/commit/b9a532277938798b53178d5a66af6e2915cb27cf cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10146 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2015-7613 cve-icon
https://www.cve.org/CVERecord?id=CVE-2015-7613 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2015-10-19T10:00:00

Updated: 2024-08-06T07:51:28.498Z

Reserved: 2015-10-01T00:00:00

Link: CVE-2015-7613

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2015-10-19T10:59:08.397

Modified: 2024-07-17T15:30:18.973

Link: CVE-2015-7613

cve-icon Redhat

Severity : Important

Publid Date: 2015-10-01T00:00:00Z

Links: CVE-2015-7613 - Bugzilla