Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-2925

Опубликовано: 03 апр. 2015
Источник: redhat
CVSS2: 6
EPSS Низкий

Описание

The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."

A flaw was found in the way the Linux kernel's file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a container could use this flaw to escape the bind mount and, potentially, escalate their privileges on the system.

Отчет

This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5. This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and 7 and Red Hat Enterprise MRG 2. Future kernel updates for the respective releases may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2015:263615.12.2015
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2015:241119.11.2015
Red Hat Enterprise Linux 7kernelFixedRHSA-2015:215219.11.2015
Red Hat Enterprise Linux 7.1 Extended Update SupportkernelFixedRHSA-2015:258709.12.2015
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2016:006826.01.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1209367Kernel: vfs: Do not allow escaping from bind mounts

EPSS

Процентиль: 75%
0.00958
Низкий

6 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 9 лет назад

The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."

nvd
больше 9 лет назад

The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."

debian
больше 9 лет назад

The prepend_path function in fs/dcache.c in the Linux kernel before 4. ...

github
около 3 лет назад

The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."

oracle-oval
больше 9 лет назад

ELSA-2016-3501: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 75%
0.00958
Низкий

6 Medium

CVSS2