6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
8.6%
Race condition in the prepare_binprm function in fs/exec.c in the Linux
kernel before 3.19.6 allows local users to gain privileges by executing a
setuid program at a time instant when a chown to root is in progress, and
the ownership is changed but the setuid bit is not yet stripped.
Author | Note |
---|---|
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 10.04 | noarch | linux | < 2.6.32-74.142 | UNKNOWN |
ubuntu | 12.04 | noarch | linux | < 3.2.0-83.120 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < 3.13.0-52.85 | UNKNOWN |
ubuntu | 14.10 | noarch | linux | < 3.16.0-37.49 | UNKNOWN |
ubuntu | 15.04 | noarch | linux | < 3.19.0-16.16 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-armadaxp | < 3.2.0-1649.69 | UNKNOWN |
ubuntu | 10.04 | noarch | linux-ec2 | < 2.6.32-377.94 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-trusty | < 3.13.0-52.85~precise1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-utopic | < 3.16.0-37.49~14.04.1 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-ti-omap4 | < 3.2.0-1464.84 | UNKNOWN |
www.openwall.com/lists/oss-security/2015/04/20/1
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339
launchpad.net/bugs/cve/CVE-2015-3339
nvd.nist.gov/vuln/detail/CVE-2015-3339
security-tracker.debian.org/tracker/CVE-2015-3339
ubuntu.com/security/notices/USN-2583-1
ubuntu.com/security/notices/USN-2584-1
ubuntu.com/security/notices/USN-2596-1
ubuntu.com/security/notices/USN-2597-1
ubuntu.com/security/notices/USN-2598-1
ubuntu.com/security/notices/USN-2599-1
ubuntu.com/security/notices/USN-2600-1
ubuntu.com/security/notices/USN-2601-1
ubuntu.com/security/notices/USN-2612-1