A race condition flaw was found between the chown and execve system calls. When changing the owner of a setuid user binary to root, the race condition could momentarily make the binary setuid root. A local, unprivileged user could potentially use this flaw to escalate their privileges on the system.
Find out more about CVE-2015-3339 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 7 and MRG-2. This issue is not currently planned to be addressed in future Red Hat Enterprise Linux 5 kernel updates. Future Linux kernel updates for other releases may address this issue.
For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Base Score | 6.2 |
---|---|
Base Metrics | AV:L/AC:H/Au:N/C:C/I:C/A:C |
Access Vector | Local |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (kernel) | RHSA-2015:1272 | 2015-07-20 |
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) | RHSA-2015:2411 | 2015-11-19 |
Red Hat Enterprise Linux 7 (kernel) | RHSA-2015:2152 | 2015-11-19 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise MRG 2 | realtime-kernel | Will not fix |
Red Hat Enterprise Linux 5 | kernel | Will not fix |