Vulnerability Details : CVE-2015-3339
Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.
Products affected by CVE-2015-3339
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3339
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3339
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.2
|
MEDIUM | AV:L/AC:H/Au:N/C:C/I:C/A:C |
1.9
|
10.0
|
NIST |
CWE ids for CVE-2015-3339
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3339
-
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html
[security-announce] SUSE-SU-2015:1491-1: important: Live patch for the L
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8b01fc86b9f425899f8a3a8fc1c47d73c2c20543
kernel/git/torvalds/linux.git - Linux kernel source tree
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158804.html
[SECURITY] Fedora 20 Update: kernel-3.19.8-100.fc20
-
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
[security-announce] SUSE-SU-2016:2074-1: important: Security update for
-
http://www.securitytracker.com/id/1032412
Linux Kernel Race Condition in prepare_binprm() Lets Local Users Gain Elevated Privileges - SecurityTracker
-
http://www.debian.org/security/2015/dsa-3237
Debian -- Security Information -- DSA-3237-1 linux
-
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.6
Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
[security-announce] openSUSE-SU-2015:1382-1: important: Security update
-
http://www.openwall.com/lists/oss-security/2015/04/20/5
oss-security - Re: Linux: chown() was racy relative to execve() - Linux kernel
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Oracle Linux Bulletin - October 2015
-
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html
[security-announce] SUSE-SU-2015:1489-1: important: Live patch for the L
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Oracle Linux Bulletin - January 2016
-
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html
[security-announce] SUSE-SU-2015:1488-1: important: Live patch for the L
-
http://rhn.redhat.com/errata/RHSA-2015-1272.html
RHSA-2015:1272 - Security Advisory - Red Hat Customer Portal
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157897.html
[SECURITY] Fedora 21 Update: kernel-3.19.7-200.fc21
-
https://github.com/torvalds/linux/commit/8b01fc86b9f425899f8a3a8fc1c47d73c2c20543
fs: take i_mutex during prepare_binprm for set[ug]id executables · torvalds/linux@8b01fc8 · GitHub
-
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html
[security-announce] SUSE-SU-2015:1487-1: important: Live patch for the L
-
https://bugzilla.redhat.com/show_bug.cgi?id=1214030
1214030 – (CVE-2015-3339) CVE-2015-3339 kernel: race condition between chown() and execve()
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8b01fc86b9f425899f8a3a8fc1c47d73c2c20543
Jump to