Permissions, Privileges, and Access Controls in Linux kernel - CVE-2015-2686

 

Permissions, Privileges, and Access Controls in Linux kernel - CVE-2015-2686

Published: May 2, 2016 / Updated: August 9, 2020


Vulnerability identifier: #VU40325
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-2686
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local authenticated user to execute arbitrary code.

net/socket.c in the Linux kernel 3.19 before 3.19.3 does not validate certain range data for (1) sendto and (2) recvfrom system calls, which allows local users to gain privileges by leveraging a subsystem that uses the copy_from_iter function in the iov_iter interface, as demonstrated by the Bluetooth subsystem.


How to mitigate CVE-2015-2686

Install update from vendor's website.

Sources