Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2568

Опубликовано: 13 фев. 2017
Источник: debian
EPSS Низкий

Описание

pkexec, when used with --user nonpriv, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
policykit-1fixed123-1package
policykit-1ignoredbookwormpackage
policykit-1ignoredbullseyepackage
policykit-1ignoredbusterpackage
policykit-1ignoredstretchpackage
policykit-1ignoredjessiepackage
policykit-1ignoredwheezypackage

Примечания

  • Restricting ioctl on the kernel side seems the better approach

  • https://bugzilla.redhat.com/show_bug.cgi?id=1300746

  • Since Linux 6.4.4-1 (uploaded on 23 Jul 2023), TIOCSTI is disabled on the

  • kernel side, marking the first polkit upload after that date (123-1) as the

  • fixed version

EPSS

Процентиль: 33%
0.00131
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 9 лет назад

pkexec, when used with --user nonpriv, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

CVSS3: 6.1
redhat
около 10 лет назад

pkexec, when used with --user nonpriv, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

CVSS3: 7.8
nvd
почти 9 лет назад

pkexec, when used with --user nonpriv, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

CVSS3: 7.8
msrc
4 месяца назад

pkexec, when used with --user nonpriv, allows local users to escape to the parent session

CVSS3: 7.8
github
больше 3 лет назад

pkexec, when used with --user nonpriv, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

EPSS

Процентиль: 33%
0.00131
Низкий