Lucene search

K
f5F5F5:K17130
HistoryAug 14, 2015 - 12:00 a.m.

K17130 : Linux kernel vulnerability CVE-2015-1420

2015-08-1400:00:00
my.f5.com
11

5.4 Medium

AI Score

Confidence

High

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

8.1%

Security Advisory Description

Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function. (CVE-2015-1420)

Impact

Traffix is the only F5 product that is affected by this vulnerability. This vulnerability can allow local users read access to unauthorized memory locations.

5.4 Medium

AI Score

Confidence

High

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

8.1%