Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2853

Опубликовано: 02 мая 2016
Источник: debian

Описание

The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed3.18-1~exp1package
linuxignoredjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/

  • https://sourceforge.net/p/aufs/mailman/message/34864744/

  • This depends on a user namespace creator being able to mount aufs.

  • jessie: Unprivileged users are not allowed to create user namespaces by default; aufs is not allowed to be mounted from a new user namespace by default.

  • wheezy: User namespaces are non-functional.

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 10 лет назад

The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.

redhat
почти 10 лет назад

The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.

CVSS3: 7.8
nvd
почти 10 лет назад

The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.

CVSS3: 7.8
github
больше 3 лет назад

The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.