[USN-2600-1] Linux kernel vulnerability
Severity
Medium
CVEs
1
The system could be made to run programs as an administrator.
A race condition between chown() and execve() was discovered in the Linux
kernel. A local attacker could exploit this race by using chown on a
setuid-user-binary to gain administrative privileges.
- ID
- USN-2600-1
- Severity
- medium
- Severity from
- CVE-2015-3339
- URL
- https://ubuntu.com/security/notices/USN-2600-1
- Published
-
2015-05-05T22:32:24
(9 years ago) - Modified
-
2015-05-05T22:32:24
(9 years ago) - Other Advisories
-
- DSA-3237-1
- ELSA-2015-1272
- ELSA-2015-2152
- ELSA-2015-3053
- ELSA-2015-3054
- ELSA-2015-3055
- FEDORA-2015-10678
- FEDORA-2015-12917
- FEDORA-2015-13391
- FEDORA-2015-7371
- FEDORA-2015-7736
- FEDORA-2015-8518
- FEDORA-2015-9127
- FEDORA-2015-9704
- RHSA-2015:1272
- RHSA-2015:2152
- RHSA-2015:2411
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1071-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1376-1
- SUSE-SU-2015:1487-1
- SUSE-SU-2015:1488-1
- SUSE-SU-2015:1489-1
- SUSE-SU-2015:1491-1
- SUSE-SU-2016:2074-1
- USN-2583-1
- USN-2584-1
- USN-2596-1
- USN-2597-1
- USN-2598-1
- USN-2599-1
- USN-2601-1
- USN-2612-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |