Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-1575

Опубликовано: 02 мая 2016
Источник: debian

Описание

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.5.1-1package
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage
linux-2.6not-affectedpackage

Примечания

  • https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1534961

  • http://www.halfdog.net/Security/2016/UserNamespaceOverlayfsXattrSetgidPrivilegeEscalation/

  • http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 10 лет назад

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.

CVSS3: 7.8
nvd
почти 10 лет назад

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.

CVSS3: 7.8
github
больше 3 лет назад

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.