Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-1576

Опубликовано: 02 мая 2016
Источник: debian

Описание

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.5.1-1package
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage
linux-2.6not-affectedpackage

Примечания

  • https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1535150

  • http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/

  • http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 10 лет назад

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.

CVSS3: 7.8
nvd
почти 10 лет назад

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.

CVSS3: 7.8
github
больше 3 лет назад

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.