Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7j9j-f52c-89mj

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The clone system-call implementation in the Linux kernel before 3.8.3 does not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags, which allows local users to gain privileges by calling chroot and leveraging the sharing of the / directory between a parent process and a child process.

The clone system-call implementation in the Linux kernel before 3.8.3 does not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags, which allows local users to gain privileges by calling chroot and leveraging the sharing of the / directory between a parent process and a child process.

EPSS

Процентиль: 70%
0.00646
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

The clone system-call implementation in the Linux kernel before 3.8.3 does not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags, which allows local users to gain privileges by calling chroot and leveraging the sharing of the / directory between a parent process and a child process.

redhat
почти 13 лет назад

The clone system-call implementation in the Linux kernel before 3.8.3 does not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags, which allows local users to gain privileges by calling chroot and leveraging the sharing of the / directory between a parent process and a child process.

nvd
почти 13 лет назад

The clone system-call implementation in the Linux kernel before 3.8.3 does not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags, which allows local users to gain privileges by calling chroot and leveraging the sharing of the / directory between a parent process and a child process.

debian
почти 13 лет назад

The clone system-call implementation in the Linux kernel before 3.8.3 ...

EPSS

Процентиль: 70%
0.00646
Низкий