Vulnerability Details : CVE-2015-8709
kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here.
Products affected by CVE-2015-8709
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-8709
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-8709
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST | |
7.0
|
HIGH | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.0
|
5.9
|
NIST |
CWE ids for CVE-2015-8709
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8709
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html
[security-announce] SUSE-SU-2016:1039-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
[security-announce] SUSE-SU-2016:1764-1: important: Security update for
-
http://www.openwall.com/lists/oss-security/2015/12/17/12
oss-security - CVE Request: Linux kernel: privilege escalation in user namespaces
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html
[security-announce] SUSE-SU-2016:1038-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html
[security-announce] SUSE-SU-2016:1033-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html
[security-announce] SUSE-SU-2016:1035-1: important: Security update for
-
http://marc.info/?l=linux-kernel&m=145204362722256&w=2
'Re: [PATCH] ptrace: being capable wrt a process requires mapped uids/gids' - MARC
-
http://www.debian.org/security/2016/dsa-3434
Debian -- Security Information -- DSA-3434-1 linux
-
http://marc.info/?l=linux-kernel&m=145204641422813&w=2
'Re: [PATCH] ptrace: being capable wrt a process requires mapped uids/gids' - MARC
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
[security-announce] openSUSE-SU-2016:1008-1: important: Security update
-
http://www.securityfocus.com/bid/79899
Linux Kernel 'kernel/ptrace.c' Local Privilege Escalation Vulnerability
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
[SECURITY] Fedora 22 Update: kernel-4.3.4-200.fc22
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html
[security-announce] SUSE-SU-2016:1032-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html
[security-announce] SUSE-SU-2016:1046-1: important: Security update for
-
http://www.openwall.com/lists/oss-security/2015/12/31/5
oss-security - Re: CVE Request: Linux kernel: privilege escalation in user namespaces
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html
[security-announce] SUSE-SU-2016:1037-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html
[security-announce] SUSE-SU-2016:1031-1: important: Security update for
-
https://bugzilla.redhat.com/show_bug.cgi?id=1295287
1295287 – (CVE-2015-8709) CVE-2015-8709 Kernel: ptrace: potential privilege escalation in user namespaces
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html
[security-announce] SUSE-SU-2016:1034-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
[security-announce] SUSE-SU-2016:1019-1: important: Security update for
-
http://www.securitytracker.com/id/1034899
Linux Kernel ptrace() Namespace Bug Lets Local Users Obtain Elevated Privileges - SecurityTracker
-
https://lkml.org/lkml/2015/12/25/71
LKML: Jann Horn: [PATCH] ptrace: being capable wrt a process requires mapped uids/gids
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html
[security-announce] SUSE-SU-2016:1041-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html
[security-announce] SUSE-SU-2016:1045-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html
[security-announce] SUSE-SU-2016:1040-1: important: Security update for
Jump to