6.5 Medium
AI Score
Confidence
High
6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
9.3%
A race condition between chown() and execve() was discovered in the Linux
kernel. A local attacker could exploit this race by using chown on a
setuid-user-binary to gain administrative privileges.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.04 | noarch | linux-image-3.16.0-37-generic | < 3.16.0-37.49~14.04.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | block-modules-3.16.0-37-generic-di | < 3.16.0-37.49~14.04.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | crypto-modules-3.16.0-37-generic-di | < 3.16.0-37.49~14.04.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | fat-modules-3.16.0-37-generic-di | < 3.16.0-37.49~14.04.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | fb-modules-3.16.0-37-generic-di | < 3.16.0-37.49~14.04.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | firewire-core-modules-3.16.0-37-generic-di | < 3.16.0-37.49~14.04.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | floppy-modules-3.16.0-37-generic-di | < 3.16.0-37.49~14.04.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | fs-core-modules-3.16.0-37-generic-di | < 3.16.0-37.49~14.04.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | fs-secondary-modules-3.16.0-37-generic-di | < 3.16.0-37.49~14.04.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | input-modules-3.16.0-37-generic-di | < 3.16.0-37.49~14.04.1 | UNKNOWN |