CVE-2016-2853

The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/ - Exploit, Third Party Advisory () http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/ - Exploit, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/02/24/9 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/02/24/9 - Exploit, Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2021/10/18/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/10/18/1 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/96839 - Broken Link () http://www.securityfocus.com/bid/96839 - Broken Link
References () https://sourceforge.net/p/aufs/mailman/message/34864744/ - Third Party Advisory () https://sourceforge.net/p/aufs/mailman/message/34864744/ - Third Party Advisory

Information

Published : 2016-05-02 10:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2853

Mitre link : CVE-2016-2853

CVE.ORG link : CVE-2016-2853


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-269

Improper Privilege Management