Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-1575
HistoryFeb 22, 2016 - 12:00 a.m.

CVE-2016-1575

2016-02-2200:00:00
ubuntu.com
ubuntu.com
15

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

11.9%

The overlayfs implementation in the Linux kernel through 4.5.2 does not
properly maintain POSIX ACL xattr data, which allows local users to gain
privileges by leveraging a group-writable setgid directory.

Bugs

Notes

Author Note
jdstrand android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support
sbeattie precise does not allow unprivileged user namespaces, which is what lets an unprivileged user exploit this vulnerability; however, the issue of copying up setuid attributes still exists in the overlayfs codebase here, but it is a much lower priority to fix (needs root/CAP_SYS_ADMIN to exploit).
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchlinux< 3.13.0-79.123UNKNOWN
ubuntu15.04noarchlinux< 3.19.0-51.57UNKNOWN
ubuntu15.10noarchlinux< 4.2.0-30.35UNKNOWN
ubuntu12.04noarchlinux-lts-trusty< 3.13.0-79.123~precise1UNKNOWN
ubuntu14.04noarchlinux-lts-utopic< 3.16.0-62.82~14.04.1UNKNOWN
ubuntu14.04noarchlinux-lts-vivid< 3.19.0-51.57~14.04.1UNKNOWN
ubuntu14.04noarchlinux-lts-wily< 4.2.0-30.35~14.04.1UNKNOWN
ubuntu15.10noarchlinux-raspi2< 4.2.0-1025.32UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

11.9%