Vulnerability Name: | CCN-166612 | ||||||
Published: | 2019-04-02 | ||||||
Updated: | 2019-04-02 | ||||||
Summary: | ChromeOS could allow a local attacker to bypass security restrictions, caused by a logic flaw in the SafeSetID function in LSM. By switching to an allowed UID and then again to any other UID on the system, an attacker could exploit this vulnerability to bypass the security restrictions. | ||||||
CVSS v3 Severity: | 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||
CVSS v2 Severity: | 4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:C/A:N)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: CCN Type: Google Security Research Issue 1814 ChromeOS: multiple issues in SafeSetID LSM Source: XF Type: UNKNOWN chromeos-safesetidlsm-sec-bypass(166612) Source: CCN Type: Linux kernel source tree index : kernel/git/torvalds/linux.git | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |