CVE-2015-1420
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
16/03/2015
Last modified:
12/04/2025
Description
Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.
Impact
Base Score 2.0
1.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.18.9 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
- http://marc.info/?l=linux-kernel&m=142247707318982&w=2
- http://www.debian.org/security/2015/dsa-3170
- http://www.openwall.com/lists/oss-security/2015/01/29/12
- http://www.securityfocus.com/bid/72357
- http://www.ubuntu.com/usn/USN-2660-1
- http://www.ubuntu.com/usn/USN-2661-1
- http://www.ubuntu.com/usn/USN-2665-1
- http://www.ubuntu.com/usn/USN-2667-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1187534
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
- http://marc.info/?l=linux-kernel&m=142247707318982&w=2
- http://www.debian.org/security/2015/dsa-3170
- http://www.openwall.com/lists/oss-security/2015/01/29/12
- http://www.securityfocus.com/bid/72357
- http://www.ubuntu.com/usn/USN-2660-1
- http://www.ubuntu.com/usn/USN-2661-1
- http://www.ubuntu.com/usn/USN-2665-1
- http://www.ubuntu.com/usn/USN-2667-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1187534



