Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-1576
HistoryFeb 22, 2016 - 12:00 a.m.

CVE-2016-1576

2016-02-2200:00:00
ubuntu.com
ubuntu.com
13

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

12.0%

The overlayfs implementation in the Linux kernel through 4.5.2 does not
properly restrict the mount namespace, which allows local users to gain
privileges by mounting an overlayfs filesystem on top of a FUSE filesystem,
and then executing a crafted setuid program.

Bugs

Notes

Author Note
jdstrand android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support
sbeattie precise does not allow unprivileged user namespaces, which is what lets an unprivileged user exploit this vulnerability; however, the issue of copying up setuid attributes still exists in the overlayfs codebase here, but it is a much lower priority to fix (needs root/CAP_SYS_ADMIN to exploit).
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchlinux< 3.13.0-79.123UNKNOWN
ubuntu15.04noarchlinux< 3.19.0-51.57UNKNOWN
ubuntu15.10noarchlinux< 4.2.0-30.35UNKNOWN
ubuntu12.04noarchlinux-lts-trusty< 3.13.0-79.123~precise1UNKNOWN
ubuntu14.04noarchlinux-lts-utopic< 3.16.0-62.82~14.04.1UNKNOWN
ubuntu14.04noarchlinux-lts-vivid< 3.19.0-51.57~14.04.1UNKNOWN
ubuntu14.04noarchlinux-lts-wily< 4.2.0-30.35~14.04.1UNKNOWN
ubuntu15.10noarchlinux-raspi2< 4.2.0-1025.32UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

12.0%