Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2854

Опубликовано: 02 мая 2016
Источник: debian

Описание

The aufs module for the Linux kernel 3.x and 4.x does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed3.18-1~exp1package
linuxignoredjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/

  • https://sourceforge.net/p/aufs/mailman/message/34864744/

  • This depends on a user namespace creator being able to mount aufs.

  • jessie: Unprivileged users are not allowed to create user namespaces by default; aufs is not allowed to be mounted from a new user namespace by default.

  • wheezy: User namespaces are non-functional.

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 10 лет назад

The aufs module for the Linux kernel 3.x and 4.x does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.

redhat
почти 10 лет назад

The aufs module for the Linux kernel 3.x and 4.x does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.

CVSS3: 7.8
nvd
почти 10 лет назад

The aufs module for the Linux kernel 3.x and 4.x does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.

CVSS3: 7.8
github
больше 3 лет назад

The aufs module for the Linux kernel 3.x and 4.x does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.