Описание
The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.8.0-17.27 |
| hardy | not-affected | |
| lucid | not-affected | |
| oneiric | not-affected | |
| precise | not-affected | |
| quantal | not-affected | |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| hardy | DNE | |
| lucid | DNE | |
| oneiric | DNE | |
| precise | not-affected | |
| quantal | not-affected | |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| hardy | DNE | |
| lucid | not-affected | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| hardy | DNE | |
| lucid | ignored | end of life |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | ignored | abandoned |
| hardy | DNE | |
| lucid | DNE | |
| oneiric | ignored | end of life |
| precise | ignored | end of life |
| quantal | ignored | end of life |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | ignored | abandoned |
| hardy | DNE | |
| lucid | DNE | |
| oneiric | ignored | end of life |
| precise | ignored | end of life |
| quantal | ignored | end of life |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | ignored | abandoned |
| hardy | DNE | |
| lucid | DNE | |
| oneiric | ignored | end of life |
| precise | ignored | end of life |
| quantal | ignored | end of life |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| hardy | DNE | |
| lucid | ignored | end of life |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| hardy | DNE | |
| lucid | not-affected | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| hardy | DNE | |
| lucid | DNE | |
| oneiric | DNE | |
| precise | not-affected | |
| quantal | DNE | |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| hardy | DNE | |
| lucid | ignored | end of life |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | ignored | abandoned |
| hardy | DNE | |
| lucid | ignored | end of life |
| oneiric | ignored | end of life |
| precise | ignored | end of life |
| quantal | ignored | end of life |
| upstream | released | 3.9~rc5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| hardy | DNE | |
| lucid | DNE | |
| oneiric | not-affected | |
| precise | not-affected | |
| quantal | not-affected | |
| upstream | released | 3.9~rc5 |
Показывать по
EPSS
1.9 Low
CVSS2
Связанные уязвимости
The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.
The scm_check_creds function in net/core/scm.c in the Linux kernel bef ...
The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.
EPSS
1.9 Low
CVSS2