5.9
CVSSv2

CVE-2015-7990

Published: 28/12/2015 Updated: 17/10/2018
CVSS v2 Base Score: 5.9 | Impact Score: 8.5 | Exploitability Score: 3.4
CVSS v3 Base Score: 5.8 | Impact Score: 4.7 | Exploitability Score: 1
VMScore: 525
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:C

Vulnerability Summary

Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel prior to 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
A denial of service flaw was discovered in the Linux kernel, where a race condition caused a NULL pointer dereference in the RDS socket-creation code A local attacker could use this flaw to create a situation in which a NULL pointer crashed the kernel ...

References

CWE-362https://lkml.org/lkml/2015/10/16/530https://bugzilla.redhat.com/show_bug.cgi?id=1276437http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303ahttp://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3https://bugzilla.suse.com/show_bug.cgi?id=952384https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303ahttp://www.openwall.com/lists/oss-security/2015/10/27/5http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.htmlhttp://www.securityfocus.com/bid/77340http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.htmlhttp://www.ubuntu.com/usn/USN-2889-1http://www.ubuntu.com/usn/USN-2890-1http://www.ubuntu.com/usn/USN-2890-3http://www.ubuntu.com/usn/USN-2887-2http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.htmlhttp://www.ubuntu.com/usn/USN-2888-1http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.htmlhttp://www.ubuntu.com/usn/USN-2889-2http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.htmlhttp://www.ubuntu.com/usn/USN-2890-2http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.htmlhttp://www.ubuntu.com/usn/USN-2887-1http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.htmlhttp://www.ubuntu.com/usn/USN-2886-1http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.htmlhttp://www.debian.org/security/2015/dsa-3396http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.htmlhttp://lists.opensuse.org/opensuse-updates/2015-12/msg00039.htmlhttp://www.securitytracker.com/id/1034453http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlhttps://nvd.nist.govhttps://usn.ubuntu.com/2886-1/