CVE-2015-2925

CVSS v2.0 6.9 (Medium)
69% Progress
EPSS 0.04 % (11th)
0.04% Progress
Affected Products 3
Advisories 28
NVD Status Analyzed

The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."

Weaknesses
CWE-NVD-Other
CVE Status
PUBLISHED
NVD Status
Analyzed
CNA
MITRE
Published Date
2015-11-16 11:59:00
(8 years ago)
Updated Date
2024-07-17 15:29:49
(2 months ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel prior 3.2.72 version cpe:2.3:o:linux:linux_kernel < 3.2.72
  Linux Kernel from 3.3 version and prior 3.4.110 version cpe:2.3:o:linux:linux_kernel >= 3.3 < 3.4.110
  Linux Kernel from 3.5 version and prior 3.10.91 version cpe:2.3:o:linux:linux_kernel >= 3.5 < 3.10.91
  Linux Kernel from 3.11 version and prior 3.12.49 version cpe:2.3:o:linux:linux_kernel >= 3.11 < 3.12.49
  Linux Kernel from 3.13 version and prior 3.14.55 version cpe:2.3:o:linux:linux_kernel >= 3.13 < 3.14.55
  Linux Kernel from 3.15 version and prior 3.16.35 version cpe:2.3:o:linux:linux_kernel >= 3.15 < 3.16.35
  Linux Kernel from 3.17 version and prior 3.18.23 version cpe:2.3:o:linux:linux_kernel >= 3.17 < 3.18.23
  Linux Kernel from 3.19 version and prior 4.1.11 version cpe:2.3:o:linux:linux_kernel >= 3.19 < 4.1.11
  Linux Kernel from 4.2 version and prior 4.2.4 version cpe:2.3:o:linux:linux_kernel >= 4.2 < 4.2.4

Configuration #2

    CPE23 From Up To
  Debian Linux 7.0 cpe:2.3:o:debian:debian_linux:7.0
  Debian Linux 8.0 cpe:2.3:o:debian:debian_linux:8.0

Configuration #3

    CPE23 From Up To
  Canonical Ubuntu Linux 12.04 cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-
  Canonical Ubuntu Linux 14.04 cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm
  Canonical Ubuntu Linux 15.04 cpe:2.3:o:canonical:ubuntu_linux:15.04
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...