Revision Date: | 2015-05-27 | Version: | 1 | Title: | CVE-2015-3339 on Ubuntu 14.04 LTS (trusty) - high. | Description: | Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped. A race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2015-3339
| Platform(s): | Ubuntu 14.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 14.04 LTS (trusty) is installed. AND Package Information
The 'linux' package in trusty was vulnerable but has been fixed (note: '3.13.0-52.85').
OR NOT While related to the CVE in some way, the 'linux-aws' package in trusty is not affected (note: '4.4.0-1002.2').
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR The 'linux-lts-utopic' package in trusty was vulnerable but has been fixed (note: '3.16.0-37.49~14.04.1').
OR NOT While related to the CVE in some way, the 'linux-lts-vivid' package in trusty is not affected (note: '3.19.0-18.18~14.04.1').
OR NOT While related to the CVE in some way, the 'linux-lts-wily' package in trusty is not affected (note: '4.2.0-18.22~14.04.1').
OR NOT While related to the CVE in some way, the 'linux-lts-xenial' package in trusty is not affected (note: '4.4.0-13.29~14.04.1').
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
|
|