6.6 Medium
AI Score
Confidence
High
6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
9.4%
A race condition between chown() and execve() was discovered in the Linux
kernel. A local attacker could exploit this race by using chown on a
setuid-user-binary to gain administrative privileges.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.04 | noarch | linux-image-3.13.0-52-generic | <Â 3.13.0-52.85 | UNKNOWN |
Ubuntu | 14.04 | noarch | block-modules-3.13.0-52-generic-di | <Â 3.13.0-52.85 | UNKNOWN |
Ubuntu | 14.04 | noarch | crypto-modules-3.13.0-52-generic-di | <Â 3.13.0-52.85 | UNKNOWN |
Ubuntu | 14.04 | noarch | fat-modules-3.13.0-52-generic-di | <Â 3.13.0-52.85 | UNKNOWN |
Ubuntu | 14.04 | noarch | fb-modules-3.13.0-52-generic-di | <Â 3.13.0-52.85 | UNKNOWN |
Ubuntu | 14.04 | noarch | firewire-core-modules-3.13.0-52-generic-di | <Â 3.13.0-52.85 | UNKNOWN |
Ubuntu | 14.04 | noarch | floppy-modules-3.13.0-52-generic-di | <Â 3.13.0-52.85 | UNKNOWN |
Ubuntu | 14.04 | noarch | fs-core-modules-3.13.0-52-generic-di | <Â 3.13.0-52.85 | UNKNOWN |
Ubuntu | 14.04 | noarch | fs-secondary-modules-3.13.0-52-generic-di | <Â 3.13.0-52.85 | UNKNOWN |
Ubuntu | 14.04 | noarch | input-modules-3.13.0-52-generic-di | <Â 3.13.0-52.85 | UNKNOWN |