9.8
CVSSv3

CVE-2015-8812

Published: 27/04/2016 Updated: 19/01/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel prior to 4.5 does not properly identify error conditions, which allows remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.

Vulnerable Product Search on Vulmon Subscribe to Product

novell suse linux enterprise real time extension 12

linux linux kernel

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

Vendor Advisories

Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
A use-after-free flaw was found in the CXGB3 kernel driver when the network was considered to be congested The kernel incorrectly misinterpreted the congestion as an error condition and incorrectly freed or cleaned up the socket buffer (skb) When the device then sent the skb's queued data, these structures were referenced A local attacker could ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
USN 2948-1 introduced a regression in the Ubuntu 1410 Linux kernel backported to Ubuntu 1404 LTS ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...

Recent Articles

Ubuntu plugs code exec, DoS Linux kernel holes
The Register • Team Register • 07 Apr 2016

This is kind of a big deal because the mess is in 14.04 LTS, expiry date 2019

Ubuntu has patched four Linux kernel vulnerabilities that allowed for arbitrary code execution and denial of service attacjs. The flaws (CVE-2015-8812, CVE-2016-2085, CVE-2016-2550, CVE-2016-2847) is fixed in Ubuntu 14.04 LTS. Researcher Venkatesh Pottem found a use-after-free vulnerability in the Linux kernel CXGB3 driver which local hackers could use to trigger a crash or execute arbitrary code. Xiaofei Rex Guo reported a second timing side channel vulnerability in the Linux Extended Verificat...

References

NVD-CWE-Otherhttps://bugzilla.redhat.com/show_bug.cgi?id=1303532http://www.openwall.com/lists/oss-security/2016/02/11/1http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=67f1aee6f45059fd6b0f5b0ecb2c97ad0451f6b3https://github.com/torvalds/linux/commit/67f1aee6f45059fd6b0f5b0ecb2c97ad0451f6b3http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.htmlhttp://www.securityfocus.com/bid/83218http://www.debian.org/security/2016/dsa-3503http://www.ubuntu.com/usn/USN-2967-1http://www.ubuntu.com/usn/USN-2967-2http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.htmlhttp://www.ubuntu.com/usn/USN-2946-2http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.htmlhttp://www.ubuntu.com/usn/USN-2947-3http://www.ubuntu.com/usn/USN-2948-2http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.htmlhttp://www.ubuntu.com/usn/USN-2947-1http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.htmlhttp://www.ubuntu.com/usn/USN-2949-1http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.htmlhttp://www.ubuntu.com/usn/USN-2947-2http://www.ubuntu.com/usn/USN-2946-1http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.htmlhttp://www.ubuntu.com/usn/USN-2948-1http://rhn.redhat.com/errata/RHSA-2016-2584.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2574.htmlhttps://access.redhat.com/errata/RHSA-2016:2574https://nvd.nist.govhttps://usn.ubuntu.com/2949-1/https://access.redhat.com/security/cve/cve-2015-8812