First published: Fri Jan 30 2015(Updated: )
A specially crafted user space application may exploit a bug in handle_to_path to copy additional data to a target application. This defect is caused by the kernel incorrectly assuming that the arguments provided do not change. This is problematic since the kernel does size verifications only after the first read, so if the number of extra bytes changes in userspace between the first and second calls, we'll have an incoherent view of file_handle. The fix is to read the size once, and copy that over to the final structure referencing it from that point rather than the value from the application which may change. The patch is not yet present in official kernel tree: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/fs/fhandle.c">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/fs/fhandle.c</a> Proposed Patch: <a href="http://marc.info/?l=linux-kernel&m=142247707318982&w=2">http://marc.info/?l=linux-kernel&m=142247707318982&w=2</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =7.0 | |
Linux kernel | <=3.18.9 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1420 has been classified with a high severity due to potential data leakage and application manipulation.
To fix CVE-2015-1420, upgrade to the patched versions of the Linux kernel as specified in the advisory.
CVE-2015-1420 affects several versions of the Linux kernel, specifically versions up to 3.18.9 and specific Debian kernel packages.
CVE-2015-1420 is primarily an issue with local user applications, making remote exploitation unlikely but not impossible if local access is compromised.
The potential impacts of CVE-2015-1420 include unintended data copying, leading to information disclosure and application errors.