Vulnerability Description
The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 3.2.69 |
| Debian | Debian Linux | 7.0 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.htmlIssue TrackingThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.htmlIssue TrackingThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.htmlIssue TrackingThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.htmlIssue TrackingThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.htmlIssue TrackingThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1081.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1199.htmlThird Party Advisory
- http://www.debian.org/security/2015/dsa-3237Third Party Advisory
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.3Vendor Advisory
- http://www.openwall.com/lists/oss-security/2015/04/14/16Mailing List
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.hThird Party Advisory
- http://www.securitytracker.com/id/1032416Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2631-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2632-1Third Party Advisory
FAQ
What is CVE-2015-3331?
CVE-2015-3331 is a vulnerability with a CVSS score of 9.3 (HIGH). The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows con...
How severe is CVE-2015-3331?
CVE-2015-3331 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3331?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Canonical Ubuntu Linux.