First published: Fri Nov 21 2014(Updated: )
A flaw was found where a regular user could remove xattr permissions on files by using the chown or write systemcalls. An attacker could use this feature to remove capabilities effectively denying elevated permissions to valid users. Certain services and applications require the capabilities subsystem to work correctly. Discussed here: <a href="https://lkml.org/lkml/2015/1/17/145">https://lkml.org/lkml/2015/1/17/145</a> As of 3.19 release, this commit is NOT in mainline tree.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | <=3.16.7-2<=3.2.63-2+deb7u1 | 3.2.84-1 4.8.11-1 3.16.39-1 |
Linux Kernel | >=3.0<=3.19.8 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise MRG | =2.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1350 is considered a medium severity vulnerability.
To fix CVE-2015-1350, update the Linux Kernel to a version that is not affected by this vulnerability.
CVE-2015-1350 affects multiple versions of the Linux Kernel, Red Hat Enterprise Linux, and Debian-based systems.
CVE-2015-1350 allows an attacker to remove capabilities, potentially denying elevated permissions to valid users.
CVE-2015-1350 is a local vulnerability that can be exploited by authenticated users on the system.