7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
5.1%
The clone system-call implementation in the Linux kernel before 3.8.3 does
not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags,
which allows local users to gain privileges by calling chroot and
leveraging the sharing of the / directory between a parent process and a
child process.
Author | Note |
---|---|
mdeslaur | reproducer: http://stealth.openwall.net/xSports/clown-newuser.c |
jdstrand | this became privilege esclation when 5eaf563e53294d6696e651466697eb9d491f3946 removed the checks for CAP_SYS_ADMIN, CAP_SETUID and CAP_SETGID |