Lucene search

K
f5F5F5:K17462
HistoryOct 19, 2015 - 12:00 a.m.

K17462 : Linux kernel vulnerability CVE-2015-2830

2015-10-1900:00:00
my.f5.com
37

AI Score

5.4

Confidence

High

EPSS

0

Percentile

10.1%

Security Advisory Description

arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16. (CVE-2015-2830)

Impact

An authenticated attacker may be able to cause an escalation of privileges through a crafted application that uses the fork or close system call.