CVE-2015-1420

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.

References

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html

http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html

http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html

http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html

http://marc.info/?l=linux-kernel&m=142247707318982&w=2

http://www.debian.org/security/2015/dsa-3170

http://www.openwall.com/lists/oss-security/2015/01/29/12

http://www.securityfocus.com/bid/72357

http://www.ubuntu.com/usn/USN-2660-1

http://www.ubuntu.com/usn/USN-2661-1

http://www.ubuntu.com/usn/USN-2665-1

http://www.ubuntu.com/usn/USN-2667-1

https://bugzilla.redhat.com/show_bug.cgi?id=1187534

Details

Source: MITRE

Published: 2015-03-16

Updated: 2016-12-28

Type: CWE-362

Risk Information

CVSS v2

Base Score: 1.9

Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.4

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 3.18.9 (inclusive)

Tenable Plugins

View all (21 total)

IDNameProductFamilySeverity
125301EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1508)NessusHuawei Local Security Checks
high
124809EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1485)NessusHuawei Local Security Checks
high
100238OracleVM 3.2 : Unbreakable / etc (OVMSA-2017-0106)NessusOracleVM Local Security Checks
critical
100235Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2017-3567)NessusOracle Linux Local Security Checks
critical
97120OracleVM 3.2 : Unbreakable / etc (OVMSA-2017-0041)NessusOracleVM Local Security Checks
high
97118Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2017-3516)NessusOracle Linux Local Security Checks
high
88545openSUSE Security Update : the Linux Kernel (openSUSE-2016-124)NessusSuSE Local Security Checks
high
86290SUSE SLED11 / SLES11 Security Update : kernel-source (SUSE-SU-2015:1678-1)NessusSuSE Local Security Checks
high
86121SUSE SLED11 / SLES11 Security Update : kernel (SUSE-SU-2015:1611-1)NessusSuSE Local Security Checks
high
85764SUSE SLES11 Security Update : kernel (SUSE-SU-2015:1478-1)NessusSuSE Local Security Checks
medium
85432openSUSE Security Update : the Linux Kernel (openSUSE-2015-543)NessusSuSE Local Security Checks
high
84618Ubuntu 15.04 : linux vulnerabilities (USN-2667-1)NessusUbuntu Local Security Checks
high
84617Ubuntu 14.10 : linux vulnerabilities (USN-2666-1)NessusUbuntu Local Security Checks
high
84616Ubuntu 14.04 LTS : linux-lts-vivid vulnerabilities (USN-2665-1)NessusUbuntu Local Security Checks
high
84615Ubuntu 14.04 LTS : linux-lts-utopic vulnerabilities (USN-2664-1)NessusUbuntu Local Security Checks
high
84614Ubuntu 14.04 LTS : linux vulnerabilities (USN-2663-1)NessusUbuntu Local Security Checks
high
84613Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-2662-1)NessusUbuntu Local Security Checks
high
84612Ubuntu 12.04 LTS : linux vulnerability (USN-2660-1)NessusUbuntu Local Security Checks
low
84309Fedora 22 : kernel-4.0.5-300.fc22 (2015-9712)NessusFedora Local Security Checks
low
84308Fedora 21 : kernel-4.0.5-200.fc21 (2015-9704)NessusFedora Local Security Checks
low
81449Debian DSA-3170-1 : linux - security updateNessusDebian Local Security Checks
critical