Описание
An issue was discovered in GNU Hurd before 0.9 20210404-9. When trying to exec a setuid executable, there's a window of time when the process already has the new privileges, but still refers to the old task and is accessible through the old process port. This can be exploited to get full root access.
Ссылки
- ExploitMailing ListVendor Advisory
- Mailing ListPatchThird Party Advisory
- ExploitMailing ListVendor Advisory
- Mailing ListPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.9.20210404-9 (исключая)
cpe:2.3:a:gnu:hurd:*:*:*:*:*:*:*:*
EPSS
Процентиль: 63%
0.00454
Низкий
7.5 High
CVSS3
8.5 High
CVSS2
Дефекты
CWE-362
Связанные уязвимости
CVSS3: 7.5
debian
больше 4 лет назад
An issue was discovered in GNU Hurd before 0.9 20210404-9. When trying ...
CVSS3: 7.5
github
больше 3 лет назад
An issue was discovered in GNU Hurd before 0.9 20210404-9. When trying to exec a setuid executable, there's a window of time when the process already has the new privileges, but still refers to the old task and is accessible through the old process port. This can be exploited to get full root access.
EPSS
Процентиль: 63%
0.00454
Низкий
7.5 High
CVSS3
8.5 High
CVSS2
Дефекты
CWE-362