3.3
CVE-2011-1833
- EPSS 0.04%
- Published 03.10.2012 11:02:55
- Last modified 11.04.2025 00:51:21
- Source security@ubuntu.com
- Teams watchlist Login
- Open Login
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version <= 3.0.44
Linux ≫ Linux Kernel Version3.0 Updaterc1
Linux ≫ Linux Kernel Version3.0 Updaterc2
Linux ≫ Linux Kernel Version3.0 Updaterc3
Linux ≫ Linux Kernel Version3.0 Updaterc4
Linux ≫ Linux Kernel Version3.0 Updaterc5
Linux ≫ Linux Kernel Version3.0 Updaterc6
Linux ≫ Linux Kernel Version3.0 Updaterc7
Linux ≫ Linux Kernel Version3.0.1
Linux ≫ Linux Kernel Version3.0.2
Linux ≫ Linux Kernel Version3.0.3
Linux ≫ Linux Kernel Version3.0.4
Linux ≫ Linux Kernel Version3.0.5
Linux ≫ Linux Kernel Version3.0.6
Linux ≫ Linux Kernel Version3.0.7
Linux ≫ Linux Kernel Version3.0.8
Linux ≫ Linux Kernel Version3.0.9
Linux ≫ Linux Kernel Version3.0.10
Linux ≫ Linux Kernel Version3.0.11
Linux ≫ Linux Kernel Version3.0.12
Linux ≫ Linux Kernel Version3.0.13
Linux ≫ Linux Kernel Version3.0.14
Linux ≫ Linux Kernel Version3.0.15
Linux ≫ Linux Kernel Version3.0.16
Linux ≫ Linux Kernel Version3.0.17
Linux ≫ Linux Kernel Version3.0.18
Linux ≫ Linux Kernel Version3.0.19
Linux ≫ Linux Kernel Version3.0.20
Linux ≫ Linux Kernel Version3.0.21
Linux ≫ Linux Kernel Version3.0.22
Linux ≫ Linux Kernel Version3.0.23
Linux ≫ Linux Kernel Version3.0.24
Linux ≫ Linux Kernel Version3.0.25
Linux ≫ Linux Kernel Version3.0.26
Linux ≫ Linux Kernel Version3.0.27
Linux ≫ Linux Kernel Version3.0.28
Linux ≫ Linux Kernel Version3.0.29
Linux ≫ Linux Kernel Version3.0.30
Linux ≫ Linux Kernel Version3.0.31
Linux ≫ Linux Kernel Version3.0.32
Linux ≫ Linux Kernel Version3.0.33
Linux ≫ Linux Kernel Version3.0.34
Linux ≫ Linux Kernel Version3.0.35
Linux ≫ Linux Kernel Version3.0.36
Linux ≫ Linux Kernel Version3.0.37
Linux ≫ Linux Kernel Version3.0.38
Linux ≫ Linux Kernel Version3.0.39
Linux ≫ Linux Kernel Version3.0.40
Linux ≫ Linux Kernel Version3.0.41
Linux ≫ Linux Kernel Version3.0.42
Linux ≫ Linux Kernel Version3.0.43
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.122 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 3.3 | 3.4 | 4.9 |
AV:L/AC:M/Au:N/C:P/I:P/A:N
|
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.