Your submission was sent successfully! Close


Published: 13 March 2016

pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie; the elibc package before 2.15-0ubuntu10.14 on Ubuntu 12.04 LTS and before 2.19-0ubuntu6.8 on Ubuntu 14.04 LTS; and the glibc package before 2.21-0ubuntu4.2 on Ubuntu 15.10 and before 2.23-0ubuntu1 on Ubuntu 16.04 LTS and 16.10 lacks a namespace check associated with file-descriptor passing, which allows local users to capture keystrokes and spoof data, and possibly gain privileges, via pts read and write operations, related to debian/sysdeps/ NOTE: this is not considered a vulnerability in the upstream GNU C Library because the upstream documentation has a clear security recommendation against the --enable-pt_chown option.

From the Ubuntu security team

Martin Carpenter discovered that pt_chown in the GNU C Library did not properly check permissions for tty files. A local attacker could use this to gain administrative privileges or expose sensitive information.



CVSS 3 base score: 8.4


Package Release Status
Launchpad, Ubuntu, Debian
Released (2.15-0ubuntu10.14)
Released (2.19-0ubuntu6.8)
upstream Needs triage

wily Does not exist

xenial Does not exist

yakkety Does not exist

zesty Does not exist

Launchpad, Ubuntu, Debian
precise Does not exist

trusty Does not exist

upstream Needs triage

Released (2.21-0ubuntu4.2)
xenial Not vulnerable
yakkety Not vulnerable
zesty Not vulnerable