Vulnerability Details : CVE-2015-1420
Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.
Products affected by CVE-2015-1420
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1420
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1420
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |
3.4
|
2.9
|
NIST |
CWE ids for CVE-2015-1420
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1420
-
http://www.ubuntu.com/usn/USN-2667-1
USN-2667-1: Linux kernel vulnerabilities | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
[security-announce] SUSE-SU-2015:1592-1: important: Security update for
-
http://www.ubuntu.com/usn/USN-2660-1
USN-2660-1: Linux kernel vulnerability | Ubuntu security notices
-
http://www.securityfocus.com/bid/72357
Linux Kernel 'fs/fhandle.c' Local Race Condition Vulnerability
-
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
[security-announce] SUSE-SU-2015:1611-1: important: Security update for
-
https://bugzilla.redhat.com/show_bug.cgi?id=1187534
1187534 – (CVE-2015-1420) CVE-2015-1420 kernel: fs/fhandle.c race condition
-
http://www.ubuntu.com/usn/USN-2665-1
USN-2665-1: Linux kernel (Vivid HWE) vulnerabilities | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
[security-announce] openSUSE-SU-2015:1382-1: important: Security update
-
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
[security-announce] SUSE-SU-2015:1224-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
[security-announce] SUSE-SU-2015:1478-1: important: Security update for
-
http://www.debian.org/security/2015/dsa-3170
Debian -- Security Information -- DSA-3170-1 linux
-
http://www.openwall.com/lists/oss-security/2015/01/29/12
oss-security - CVE-2015-1420 - Linux kernel fs/fhandle.c race condition
-
http://www.ubuntu.com/usn/USN-2661-1
USN-2661-1: Linux kernel (OMAP4) vulnerability | Ubuntu security notices
-
http://marc.info/?l=linux-kernel&m=142247707318982&w=2
'[PATCH v2] vfs: read file_handle only once in handle_to_path' - MARC
Jump to