The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360 - Mailing List, Patch, Vendor Advisory | |
References | () http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1576.html - Third Party Advisory | |
References | () http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/ - Exploit, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/02/24/8 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/10/18/1 - Mailing List, Third Party Advisory | |
References | () https://bugs.launchpad.net/bugs/1535150 - Third Party Advisory | |
References | () https://launchpadlibrarian.net/235300093/0005-overlayfs-Be-more-careful-about-copying-up-sxid-file.patch - Mailing List, Patch, Third Party Advisory | |
References | () https://launchpadlibrarian.net/235300225/0006-overlayfs-Propogate-nosuid-from-lower-and-upper-moun.patch - Mailing List, Patch, Third Party Advisory |
Information
Published : 2016-05-02 10:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1576
Mitre link : CVE-2016-1576
CVE.ORG link : CVE-2016-1576
JSON object : View
Products Affected
canonical
- ubuntu_linux
- ubuntu_core
- ubuntu_touch
linux
- linux_kernel
CWE