First published: Sat Dec 31 2005(Updated: )
The Linux 2.4 kernel patch in kernel-patch-vserver before 1.9.5.5 and 2.x before 2.3 for Debian GNU/Linux does not correctly set the "chroot barrier" with util-vserver, which allows attackers to access files on the host system that are outside of the vserver.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.0 | |
Debian kernel-patch-vserver | <1.9.5.5 | |
Debian kernel-patch-vserver | >=2.0<2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2005-4347 is generally considered to be high due to the potential for unauthorized access to sensitive files.
To fix CVE-2005-4347, upgrade to kernel-patch-vserver version 1.9.5.5 or later for Debian systems.
CVE-2005-4347 affects Debian GNU/Linux versions 3.0 and 3.1 using kernel-patch-vserver version 1.9.5.5 or earlier.
Exploitation of CVE-2005-4347 could allow attackers to escape the isolated environment of a vserver and access host files.
The impact of CVE-2005-4347 includes compromising the confidentiality and integrity of files on the host system.