[kernel-sec-discuss] r4063 - active

Ben Hutchings benh at moszumanska.debian.org
Sun Dec 27 06:23:18 UTC 2015


Author: benh
Date: 2015-12-27 06:23:17 +0000 (Sun, 27 Dec 2015)
New Revision: 4063

Added:
   active/CVE-2015-userns-ptrace-priv-esc
Log:
Add placeholder for userns ptrace privilege escalation without CVE ID

Added: active/CVE-2015-userns-ptrace-priv-esc
===================================================================
--- active/CVE-2015-userns-ptrace-priv-esc	                        (rev 0)
+++ active/CVE-2015-userns-ptrace-priv-esc	2015-12-27 06:23:17 UTC (rev 4063)
@@ -0,0 +1,14 @@
+Description: privileged process entering userns can be ptraced by userns owner
+References:
+ https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1527374
+ https://lkml.org/lkml/2015/12/25/71
+Notes:
+Bugs:
+upstream: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: N/A "Vulnerable code not present"
+2.6.32-upstream-stable: N/A "Vulnerable code not present"
+sid: pending (4.3.3-3) [bugfix/all/ptrace-being-capable-wrt-a-process-requires-mapped-uids-gids.patch]
+3.16-jessie-security: needed
+3.2-wheezy-security: N/A "Vulnerable code not present"
+2.6.32-squeeze-security: N/A "Vulnerable code not present"




More information about the kernel-sec-discuss mailing list