6.6 Medium
AI Score
Confidence
High
6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
9.3%
A race condition between chown() and execve() was discovered in the Linux
kernel. A local attacker could exploit this race by using chown on a
setuid-user-binary to gain administrative privileges.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 10.04 | noarch | linux-image-2.6.32-74-powerpc | < 2.6.32-74.142 | UNKNOWN |
Ubuntu | 10.04 | noarch | block-modules-2.6.32-74-generic-di | < 2.6.32-74.142 | UNKNOWN |
Ubuntu | 10.04 | noarch | char-modules-2.6.32-74-generic-di | < 2.6.32-74.142 | UNKNOWN |
Ubuntu | 10.04 | noarch | crypto-modules-2.6.32-74-generic-di | < 2.6.32-74.142 | UNKNOWN |
Ubuntu | 10.04 | noarch | fat-modules-2.6.32-74-generic-di | < 2.6.32-74.142 | UNKNOWN |
Ubuntu | 10.04 | noarch | fb-modules-2.6.32-74-generic-di | < 2.6.32-74.142 | UNKNOWN |
Ubuntu | 10.04 | noarch | firewire-core-modules-2.6.32-74-generic-di | < 2.6.32-74.142 | UNKNOWN |
Ubuntu | 10.04 | noarch | floppy-modules-2.6.32-74-generic-di | < 2.6.32-74.142 | UNKNOWN |
Ubuntu | 10.04 | noarch | fs-core-modules-2.6.32-74-generic-di | < 2.6.32-74.142 | UNKNOWN |
Ubuntu | 10.04 | noarch | fs-secondary-modules-2.6.32-74-generic-di | < 2.6.32-74.142 | UNKNOWN |