Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8709

Опубликовано: 08 фев. 2016
Источник: debian
EPSS Низкий

Описание

kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.3.3-3package
linuxfixed3.16.7-ckt20-1+deb8u2jessiepackage
linuxnot-affectedwheezypackage
linux-2.6not-affectedpackage

Примечания

  • CVE Request: https://www.openwall.com/lists/oss-security/2015/12/17/12

  • https://lkml.org/lkml/2015/12/12/259

EPSS

Процентиль: 19%
0.00059
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
почти 10 лет назад

kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here.

redhat
около 10 лет назад

kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here.

CVSS3: 7
nvd
почти 10 лет назад

kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here.

CVSS3: 7
github
больше 3 лет назад

** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here."

suse-cvrf
почти 10 лет назад

Security update for Linux Kernel Live Patch 5

EPSS

Процентиль: 19%
0.00059
Низкий