[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Use-after-free vulnerability in ping socket implementation in kernel

ID: oval:org.secpod.oval:def:25172Date: (C)2015-06-23   (M)2024-02-19
Class: VULNERABILITYFamily: unix




The host is installed with kernel on Red Hat Enterprise Linux 6 or 7 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle rename operations. Successful exploitation could allow attackers to escalate privileges on the affected system.

Platform:
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Product:
kernel
Reference:
CVE-2015-3636
CVE    1
CVE-2015-3636
CPE    3
cpe:/o:linux:linux_kernel
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:6

© SecPod Technologies