436
VMScore

CVE-2014-3519

Published: 01/02/2018 Updated: 27/02/2018
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.5 | Impact Score: 4 | Exploitability Score: 2
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Summary

The open_by_handle_at function in vzkernel prior to 042stab090.5 in the OpenVZ modification for the Linux kernel 2.6.32, when using simfs, might allow local container users with CAP_DAC_READ_SEARCH capability to bypass an intended container protection mechanism and access arbitrary files on a filesystem via vectors related to use of the file_handle structure.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openvz vzkernel 2.6.32

Github Repositories

Proxmox

proxomox About bug CVE-2014-3519 wwwopenwallcom/lists/oss-security/2014/06/24/16 wwwwebhostingtalkcom/showthreadphp?t=1387714 Updated kernel packages that fix three security issues But I'm using proxmox 23 (debian 6) and I don't want move to proxmox 3x How to update kernel package? apt-get install git -y git clone git://gitproxmoxcom/git/pv