Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1858

Опубликовано: 05 апр. 2013
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 7.2

Описание

The clone system-call implementation in the Linux kernel before 3.8.3 does not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags, which allows local users to gain privileges by calling chroot and leveraging the sharing of the / directory between a parent process and a child process.

РелизСтатусПримечание
devel

not-affected

3.8.0-13.22
hardy

not-affected

lucid

not-affected

oneiric

not-affected

precise

not-affected

quantal

not-affected

upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

DNE

oneiric

DNE

precise

not-affected

quantal

not-affected

upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

oneiric

DNE

precise

DNE

quantal

DNE

upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

ignored

abandoned
hardy

DNE

lucid

DNE

oneiric

ignored

end of life
precise

ignored

end of life
quantal

ignored

end of life
upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

ignored

abandoned
hardy

DNE

lucid

DNE

oneiric

ignored

end of life
precise

ignored

end of life
quantal

ignored

end of life
upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

ignored

abandoned
hardy

DNE

lucid

DNE

oneiric

ignored

end of life
precise

ignored

end of life
quantal

ignored

end of life
upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

oneiric

DNE

precise

DNE

quantal

DNE

upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

DNE

oneiric

DNE

precise

not-affected

quantal

DNE

upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

ignored

abandoned
hardy

DNE

lucid

ignored

end of life
oneiric

ignored

end of life
precise

ignored

end of life
quantal

ignored

end of life
upstream

released

3.9~rc3

Показывать по

РелизСтатусПримечание
devel

not-affected

hardy

DNE

lucid

DNE

oneiric

not-affected

precise

not-affected

quantal

not-affected

upstream

released

3.9~rc3

Показывать по

EPSS

Процентиль: 70%
0.00646
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
почти 13 лет назад

The clone system-call implementation in the Linux kernel before 3.8.3 does not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags, which allows local users to gain privileges by calling chroot and leveraging the sharing of the / directory between a parent process and a child process.

nvd
почти 13 лет назад

The clone system-call implementation in the Linux kernel before 3.8.3 does not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags, which allows local users to gain privileges by calling chroot and leveraging the sharing of the / directory between a parent process and a child process.

debian
почти 13 лет назад

The clone system-call implementation in the Linux kernel before 3.8.3 ...

github
больше 3 лет назад

The clone system-call implementation in the Linux kernel before 3.8.3 does not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags, which allows local users to gain privileges by calling chroot and leveraging the sharing of the / directory between a parent process and a child process.

EPSS

Процентиль: 70%
0.00646
Низкий

7.2 High

CVSS2

Уязвимость CVE-2013-1858