{"id":"CVE-2015-2925","details":"The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"","modified":"2026-02-05T07:29:47.039323Z","published":"2015-11-16T11:59:00Z","related":["SUSE-SU-2015:2194-1","SUSE-SU-2015:2292-1","SUSE-SU-2016:0335-1","SUSE-SU-2016:0337-1","SUSE-SU-2016:0380-1","SUSE-SU-2016:0381-1","SUSE-SU-2016:0383-1","SUSE-SU-2016:0384-1","SUSE-SU-2016:0386-1","SUSE-SU-2016:0387-1","SUSE-SU-2016:0434-1"],"references":[{"type":"ADVISORY","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=397d425dc26da728396e66d392d5dcb8dac30c37"},{"type":"ADVISORY","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cde93be45a8a90d8c264c776fab63487b5038a65"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html"},{"type":"ADVISORY","url":"http://pkgs.fedoraproject.org/cgit/kernel.git/commit/?h=f22&id=520b64102de2f184036024b2a53de2b67463bd78"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2636.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0068.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3364"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3372"},{"type":"ADVISORY","url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.4"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2015/04/04/4"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/73926"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2792-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2794-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2795-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2798-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2799-1"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209367"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209373"},{"type":"ADVISORY","url":"https://github.com/torvalds/linux/commit/397d425dc26da728396e66d392d5dcb8dac30c37"},{"type":"ADVISORY","url":"https://github.com/torvalds/linux/commit/cde93be45a8a90d8c264c776fab63487b5038a65"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/04/04/4"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209367"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209373"},{"type":"WEB","url":"http://permalink.gmane.org/gmane.linux.kernel.containers/29173"},{"type":"WEB","url":"http://permalink.gmane.org/gmane.linux.kernel.containers/29177"}],"schema_version":"1.7.3"}