Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w7c5-wqfh-q935

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.

The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.

EPSS

Процентиль: 12%
0.00039
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.

nvd
почти 13 лет назад

The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.

debian
почти 13 лет назад

The scm_check_creds function in net/core/scm.c in the Linux kernel bef ...

EPSS

Процентиль: 12%
0.00039
Низкий