Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-5123

Опубликовано: 12 окт. 2017
Источник: redhat
CVSS3: 7.8

Описание

Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.

The waitid implementation in upstream kernels did not restrict the target destination to copy information results. This can allow local users to write to otherwise protected kernel memory, which can lead to privilege escalation.

Отчет

This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux as they did not include the upstream commit https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4c48abe91be03d191d0c20cc755877da2cb35622 that introduced this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-altNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise MRG 2realtime-kernelNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-391
https://bugzilla.redhat.com/show_bug.cgi?id=1500094kernel: Missing access_ok() checks in waitid()

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 4 лет назад

Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.

CVSS3: 8.8
nvd
больше 4 лет назад

Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.

CVSS3: 8.8
debian
больше 4 лет назад

Insufficient data validation in waitid allowed an user to escape sandb ...

CVSS3: 8.8
github
больше 3 лет назад

Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.

CVSS3: 7.8
fstec
больше 8 лет назад

Уязвимость реализации функции waitid ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

7.8 High

CVSS3