Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-4774

Опубликовано: 15 янв. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.9

Описание

The Linux kernel before 2.4.36-rc1 has a race condition. It was possible to bypass systrace policies by flooding the ptraced process with SIGCONT signals, which can can wake up a PTRACED process.

РелизСтатусПримечание
bionic

not-affected

4.13.0-16.19
devel

not-affected

2.4.36
disco

not-affected

4.18.0-10.11
eoan

not-affected

5.0.0-13.14
esm-infra-legacy/trusty

ignored

was needed ESM criteria
esm-infra/bionic

not-affected

4.13.0-16.19
esm-infra/xenial

not-affected

4.2.0-16.19
precise/esm

ignored

end of life, was needed
trusty

ignored

end of standard support
trusty/esm

ignored

end of ESM support, was ignored [was needed ESM criteria]

Показывать по

РелизСтатусПримечание
bionic

not-affected

4.15.0-1001.1
devel

not-affected

disco

not-affected

4.18.0-1002.3
eoan

not-affected

5.0.0-1004.4
esm-infra-legacy/trusty

ignored

was needed ESM criteria
esm-infra/bionic

not-affected

4.15.0-1001.1
esm-infra/xenial

not-affected

4.4.0-1001.10
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

ignored

end of ESM support, was ignored [was needed ESM criteria]

Показывать по

РелизСтатусПримечание
bionic

not-affected

5.0.0-1021.24~18.04.1
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

5.0.0-1021.24~18.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

4.15.0-1030.31~16.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2

Показывать по

РелизСтатусПримечание
bionic

not-affected

4.15.0-1002.2
devel

not-affected

disco

not-affected

4.18.0-1003.3
eoan

not-affected

5.0.0-1004.4
esm-infra-legacy/trusty

ignored

was needed ESM criteria
esm-infra/bionic

not-affected

4.15.0-1002.2
esm-infra/xenial

not-affected

4.11.0-1009.9
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

ignored

end of ESM support, was ignored [was needed ESM criteria]

Показывать по

РелизСтатусПримечание
bionic

not-affected

5.3.0-1007.8~18.04.1
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

5.3.0-1007.8~18.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2

Показывать по

РелизСтатусПримечание
bionic

not-affected

2.4.36
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

2.4.36
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2

Показывать по

РелизСтатусПримечание
bionic

not-affected

4.15.0-1001.1
devel

not-affected

disco

not-affected

4.18.0-1002.3
eoan

not-affected

5.0.0-1004.4
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

4.15.0-1001.1
esm-infra/xenial

not-affected

4.10.0-1004.4
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

5.3.0-1008.9~18.04.1
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

5.3.0-1008.9~18.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2

Показывать по

РелизСтатусПримечание
bionic

not-affected

2.4.36
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

2.4.36
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2

Показывать по

РелизСтатусПримечание
bionic

not-affected

4.15.0-1030.32
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

4.15.0-1030.32
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2

Показывать по

РелизСтатусПримечание
bionic

not-affected

5.0.0-1011.11~18.04.1
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

4.18.0-13.14~18.04.1
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

4.18.0-13.14~18.04.1
esm-infra/xenial

not-affected

4.8.0-36.36~16.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

2.4.36
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

2.4.36
esm-infra/xenial

not-affected

2.4.36
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

4.15.0-1002.2
devel

not-affected

disco

not-affected

4.18.0-1003.3
eoan

not-affected

5.0.0-1004.4
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

4.15.0-1002.2
esm-infra/xenial

not-affected

4.4.0-1004.9
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

ignored

end of life, was needed
trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

ignored

was needed ESM criteria
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

ignored

end of ESM support, was ignored [was needed ESM criteria]
upstream

released

2.6.12~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

4.15.0-1002.3
devel

DNE

disco

not-affected

4.15.0-1021.24
eoan

not-affected

4.15.0-1035.40
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

4.15.0-1002.3
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2

Показывать по

РелизСтатусПримечание
bionic

not-affected

5.0.0-1010.11
devel

DNE

disco

not-affected

5.0.0-1010.11
eoan

not-affected

5.0.0-1010.11
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

4.15.0-1007.9
devel

not-affected

disco

not-affected

4.15.0-1007.9
eoan

not-affected

4.15.0-1011.13
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

4.15.0-1007.9
esm-infra/xenial

not-affected

4.15.0-1007.9~16.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

5.0.0-1007.12~18.04.1
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

5.0.0-1007.12~18.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2

Показывать по

РелизСтатусПримечание
bionic

not-affected

4.13.0-1005.5
devel

not-affected

disco

not-affected

4.18.0-1005.7
eoan

not-affected

5.0.0-1006.6
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2
xenial

not-affected

4.2.0-1013.19

Показывать по

РелизСтатусПримечание
bionic

not-affected

4.4.0-1077.82
devel

DNE

disco

not-affected

5.0.0-1010.10
eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.6.12~rc2
xenial

not-affected

4.4.0-1012.12

Показывать по

EPSS

Процентиль: 40%
0.00177
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.1
redhat
больше 17 лет назад

The Linux kernel before 2.4.36-rc1 has a race condition. It was possible to bypass systrace policies by flooding the ptraced process with SIGCONT signals, which can can wake up a PTRACED process.

CVSS3: 5.9
nvd
больше 5 лет назад

The Linux kernel before 2.4.36-rc1 has a race condition. It was possible to bypass systrace policies by flooding the ptraced process with SIGCONT signals, which can can wake up a PTRACED process.

CVSS3: 5.9
debian
больше 5 лет назад

The Linux kernel before 2.4.36-rc1 has a race condition. It was possib ...

github
больше 3 лет назад

The Linux kernel before 2.4.36-rc1 has a race condition. It was possible to bypass systrace policies by flooding the ptraced process with SIGCONT signals, which can can wake up a PTRACED process.

EPSS

Процентиль: 40%
0.00177
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Уязвимость CVE-2007-4774