Vulnerability Name: | CVE-2015-5327 (CCN-108359) | ||||||||||||||||||||
Assigned: | 2015-11-27 | ||||||||||||||||||||
Published: | 2015-11-27 | ||||||||||||||||||||
Updated: | 2019-03-07 | ||||||||||||||||||||
Summary: | Out-of-bounds memory read in the x509_decode_time function in x509_cert_parser.c in Linux kernels 4.3-rc1 and after. | ||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-5327 Source: CCN Type: oss-sec Mailing List, Fri, 27 Nov 2015 15:12:18 +0100 CVE-2015-5327 kernel: User triggerable out-of-bounds read Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20151127 CVE-2015-5327 kernel: User triggerable out-of-bounds read Source: CCN Type: Red Hat Bugzilla Bug 1278978 (CVE-2015-5327) CVE-2015-5327 kernel: User triggerable out-of-bounds read Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1278978 Source: XF Type: UNKNOWN linux-kernel-cve20155327-info-disc(108359) Source: CCN Type: Linux Kernel GIT Repository X.509: Fix the time validation [ver #2] Source: CONFIRM Type: Patch https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc25b994acfbc901429da682d0f73c190e960206 Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-5327 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |