Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c. (CVE-2015-7613)
Impact
Exploitation of this issue requires shell access, and a non-standard and unsupported configuration (such as modifications to Linux configuration files) may expose this issue further. F5 does not recommend manually editing Linux configuration files. There is no remote access vector or data plane exposure.