SB2015031602 - Race condition in Debian Linux
Published: March 16, 2015 Updated: August 9, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Race condition (CVE-ID: CVE-2015-1420)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.
Remediation
Install update from vendor's website.
References
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
- http://marc.info/?l=linux-kernel&m=142247707318982&w=2
- http://www.debian.org/security/2015/dsa-3170
- http://www.openwall.com/lists/oss-security/2015/01/29/12
- http://www.securityfocus.com/bid/72357
- http://www.ubuntu.com/usn/USN-2660-1
- http://www.ubuntu.com/usn/USN-2661-1
- http://www.ubuntu.com/usn/USN-2665-1
- http://www.ubuntu.com/usn/USN-2667-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1187534