Permissions, Privileges, and Access Controls in Linux kernel - CVE-2015-7442
Published: January 2, 2016 / Updated: June 1, 2020
Linux kernel
Detailed vulnerability description
The vulnerability allows a local authenticated user to execute arbitrary code.
consoleinst.sh in IBM Installation Manager before 1.7.4.4 and 1.8.x before 1.8.4 and Packaging Utility before 1.7.4.4 and 1.8.x before 1.8.4 allows local users to gain privileges via a Trojan horse program that is located in /tmp with a name based on a predicted PID value.