[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-4014Date: (C)2014-06-23   (M)2024-04-12


The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.2
Exploit Score: 1.9
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: HIGH
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1030394
EXPLOIT-DB-33824
SECUNIA-59220
BID-67988
http://www.openwall.com/lists/oss-security/2014/06/10/4
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=23adbe12ef7d3d4195e80800ab36b37bee28cd03
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8
https://bugzilla.redhat.com/show_bug.cgi?id=1107966
https://github.com/torvalds/linux/commit/23adbe12ef7d3d4195e80800ab36b37bee28cd03
https://source.android.com/security/bulletin/2016-12-01.html

CPE    1
cpe:/o:linux:linux_kernel
CWE    1
CWE-264
OVAL    38
oval:org.secpod.oval:def:1500815
oval:org.secpod.oval:def:702124
oval:org.secpod.oval:def:702122
oval:org.secpod.oval:def:52291
...

© SecPod Technologies