{
  "name": "CVE-2015-3636",
  "CVE": [
    [
      "CVE-2015-3636",
      "Bulletin-CVE-2015-3636"
    ]
  ],
  "Coordinated_disclosure": "unknown",
  "Categories": [
    "Elevation Privilege Vulnerability in Kernel"
  ],
  "Details": [
    [
      "The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.",
      "NIST-CVE-2015-3636"
    ]
  ],
  "Discovered_on": [],
  "Discovered_by": [],
  "Submission": [
    {
      "by": "dcc52",
      "on": "2019-07-29"
    }
  ],
  "Reported_on": [
    [
      "2015-09-01",
      "Bulletin-CVE-2015-3636"
    ]
  ],
  "Fixed_on": [
    [
      "2015-05-02",
      "ANDROID-20770158"
    ]
  ],
  "Fix_released_on": [],
  "Affected_versions": [
    [
      "5.1 and below",
      "Bulletin-CVE-2015-3636"
    ]
  ],
  "Affected_devices": [],
  "Affected_versions_regexp": [
    "([1-4]\\.[0-9]\\.[0-9])|(5\\.[0-1]\\.[0-9])"
  ],
  "Affected_manufacturers": [
    [
      "all",
      "Bulletin-CVE-2015-3636"
    ]
  ],
  "Fixed_versions": [],
  "Fixed_versions_regexp": [
    ""
  ],
  "references": {
    "ANDROID-20770158": {
      "url": "https://github.com/torvalds/linux/commit/a134f083e79f"
    },
    "NIST-CVE-2015-3636": {
      "url": "https://nvd.nist.gov/vuln/data-feeds"
    },
    "Bulletin-CVE-2015-3636": {
      "url": "https://source.android.com/security/bulletin/2015-09-01.html"
    }
  },
  "Surface": [
    "local",
    "app"
  ],
  "Vector": [
    "other"
  ],
  "Target": [
    "kernel"
  ],
  "Channel": [
    "app-execution"
  ],
  "Condition": [
    "affected-app-installed"
  ],
  "Privilege": [
    "kernel"
  ],
  "CWE": [
    [
      "NVD-CWE-Other",
      "NIST-CVE-2015-3636"
    ]
  ]
}