Описание
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
The waitid implementation in upstream kernels did not restrict the target destination to copy information results. This can allow local users to write to otherwise protected kernel memory, which can lead to privilege escalation.
Отчет
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux as they did not include the upstream commit https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4c48abe91be03d191d0c20cc755877da2cb35622 that introduced this issue.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | kernel | Not affected | ||
| Red Hat Enterprise Linux 6 | kernel | Not affected | ||
| Red Hat Enterprise Linux 7 | kernel | Not affected | ||
| Red Hat Enterprise Linux 7 | kernel-alt | Not affected | ||
| Red Hat Enterprise Linux 7 | kernel-rt | Not affected | ||
| Red Hat Enterprise MRG 2 | realtime-kernel | Not affected |
Показывать по
Дополнительная информация
Статус:
7.8 High
CVSS3
Связанные уязвимости
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
Insufficient data validation in waitid allowed an user to escape sandb ...
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
Уязвимость реализации функции waitid ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
7.8 High
CVSS3