[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-1420Date: (C)2015-04-03   (M)2024-04-19


Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 1.9
Exploit Score: 3.4
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
BID-72357
DSA-3170
SUSE-SU-2015:1224
SUSE-SU-2015:1478
SUSE-SU-2015:1592
SUSE-SU-2015:1611
USN-2660-1
USN-2661-1
USN-2665-1
USN-2667-1
http://marc.info/?l=linux-kernel&m=142247707318982&w=2
http://www.openwall.com/lists/oss-security/2015/01/29/12
https://bugzilla.redhat.com/show_bug.cgi?id=1187534
openSUSE-SU-2015:1382

CPE    2
cpe:/o:debian:debian_linux:7.0
cpe:/o:linux:linux_kernel
CWE    1
CWE-362
OVAL    24
oval:org.secpod.oval:def:109216
oval:org.secpod.oval:def:52524
oval:org.secpod.oval:def:702644
oval:org.secpod.oval:def:702647
...

© SecPod Technologies