[kernel-sec-discuss] r4063 - active
Ben Hutchings
benh at moszumanska.debian.org
Sun Dec 27 06:23:18 UTC 2015
Author: benh
Date: 2015-12-27 06:23:17 +0000 (Sun, 27 Dec 2015)
New Revision: 4063
Added:
active/CVE-2015-userns-ptrace-priv-esc
Log:
Add placeholder for userns ptrace privilege escalation without CVE ID
Added: active/CVE-2015-userns-ptrace-priv-esc
===================================================================
--- active/CVE-2015-userns-ptrace-priv-esc (rev 0)
+++ active/CVE-2015-userns-ptrace-priv-esc 2015-12-27 06:23:17 UTC (rev 4063)
@@ -0,0 +1,14 @@
+Description: privileged process entering userns can be ptraced by userns owner
+References:
+ https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1527374
+ https://lkml.org/lkml/2015/12/25/71
+Notes:
+Bugs:
+upstream: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: N/A "Vulnerable code not present"
+2.6.32-upstream-stable: N/A "Vulnerable code not present"
+sid: pending (4.3.3-3) [bugfix/all/ptrace-being-capable-wrt-a-process-requires-mapped-uids-gids.patch]
+3.16-jessie-security: needed
+3.2-wheezy-security: N/A "Vulnerable code not present"
+2.6.32-squeeze-security: N/A "Vulnerable code not present"
More information about the kernel-sec-discuss
mailing list