CVE-2015-8709
Bug #1527374 reported by
Serge Hallyn
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Medium
|
Unassigned | |||
Precise |
Invalid
|
Medium
|
Unassigned | |||
Trusty |
Fix Released
|
Medium
|
Unassigned | |||
Vivid |
Fix Released
|
Medium
|
Unassigned | |||
Wily |
Fix Released
|
Medium
|
Unassigned | |||
Xenial |
Fix Released
|
Medium
|
Unassigned | |||
linux-armadaxp (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | |||
linux-flo (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | |||
linux-goldfish (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | |||
linux-lts-quantal (Ubuntu) |
Won't Fix
|
Medium
|
Unassigned | |||
linux-lts-raring (Ubuntu) |
Won't Fix
|
Medium
|
Unassigned | |||
linux-lts-saucy (Ubuntu) |
Won't Fix
|
Medium
|
Unassigned | |||
linux-lts-trusty (Ubuntu) | ||||||
Precise |
Fix Released
|
Medium
|
Unassigned | |||
linux-lts-utopic (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | |||
linux-lts-vivid (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | |||
linux-lts-wily (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | |||
linux-lts-xenial (Ubuntu) |
New
|
Undecided
|
Unassigned | |||
linux-mako (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | |||
linux-manta (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | |||
linux-raspi2 (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | |||
linux-snapdragon (Ubuntu) |
New
|
Undecided
|
Unassigned | |||
linux-ti-omap4 (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | |||
Bug Description
** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here."
Break-Fix: - local-2015-8709
no longer affects: | lxd (Ubuntu Xenial) |
no longer affects: | lxd (Ubuntu Wily) |
no longer affects: | lxd (Ubuntu Vivid) |
no longer affects: | lxd (Ubuntu Trusty) |
no longer affects: | lxc (Ubuntu Xenial) |
no longer affects: | lxc (Ubuntu Wily) |
no longer affects: | lxc (Ubuntu Vivid) |
no longer affects: | lxc (Ubuntu Trusty) |
no longer affects: | lxd (Ubuntu Precise) |
no longer affects: | lxc (Ubuntu Precise) |
no longer affects: | linux-lts-wily (Ubuntu Precise) |
no longer affects: | linux-lts-vivid (Ubuntu Precise) |
no longer affects: | linux-lts-utopic (Ubuntu Precise) |
Changed in linux-lts-trusty (Ubuntu Precise): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Precise): | |
status: | New → Invalid |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Wily): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Xenial): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Trusty): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Vivid): | |
importance: | Undecided → Medium |
description: | updated |
description: | updated |
information type: | Private Security → Public Security |
tags: | added: patch |
no longer affects: | lxd (Ubuntu) |
Changed in linux (Ubuntu Xenial): | |
status: | Incomplete → Fix Committed |
summary: |
- privilege escalation on attach through ptrace + CVE-2015-8709 |
tags: | added: kernel-cve-tracking-bug |
description: | updated |
no longer affects: | linux-lts-trusty (Ubuntu) |
Changed in linux-lts-quantal (Ubuntu): | |
importance: | Undecided → Medium |
status: | Confirmed → Won't Fix |
Changed in linux-lts-raring (Ubuntu): | |
importance: | Undecided → Medium |
status: | Confirmed → Won't Fix |
Changed in linux-lts-saucy (Ubuntu): | |
importance: | Undecided → Medium |
status: | Confirmed → Won't Fix |
description: | updated |
no longer affects: | lxc (Ubuntu) |
To post a comment you must log in.
The kernel patch to fix this is at https:/ /lkml.org/ lkml/2015/ 12/12/259