Mounting /proc filesystem via chroot command silently mounts it in read-write mode. The user could bypass the chroot environment and gain write access to files, he would never have otherwise.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=213135 | Exploit Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=213135 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 00:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=213135 - Exploit, Issue Tracking, Third Party Advisory |
07 Jun 2021, 17:39
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=213135 - Exploit, Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
CWE | CWE-668 | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
27 May 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-05-27 13:15
Updated : 2024-11-21 00:47
NVD link : CVE-2008-2544
Mitre link : CVE-2008-2544
CVE.ORG link : CVE-2008-2544
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-668
Exposure of Resource to Wrong Sphere