Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v42c-fv3v-4g2f

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."

The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."

Ссылки

EPSS

Процентиль: 75%
0.00958
Низкий

Связанные уязвимости

ubuntu
больше 9 лет назад

The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."

redhat
около 10 лет назад

The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."

nvd
больше 9 лет назад

The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."

debian
больше 9 лет назад

The prepend_path function in fs/dcache.c in the Linux kernel before 4. ...

oracle-oval
больше 9 лет назад

ELSA-2016-3501: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 75%
0.00958
Низкий