Vulnerability Name: | CVE-2016-1575 (CCN-114464) | ||||||||||||||||||||
Assigned: | 2016-02-24 | ||||||||||||||||||||
Published: | 2016-02-24 | ||||||||||||||||||||
Updated: | 2022-04-18 | ||||||||||||||||||||
Summary: | The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory. | ||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-269 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-1575 Source: CCN Type: Linux Kernel GIT Repository Merge branch 'overlayfs-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/vfs Source: MISC Type: Patch, Vendor Advisory http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360 Source: CONFIRM Type: Third Party Advisory http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1575.html Source: MISC Type: Exploit, Third Party Advisory http://www.halfdog.net/Security/2016/UserNamespaceOverlayfsXattrSetgidPrivilegeEscalation/ Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20160224 User Namespaces Overlayfs Xattr Setgid Privilege Escalation: Overlayfs Source: CCN Type: oss-sec Mailing List, Wed, 24 Feb 2016 06:03:35 +0000 Overlayfs over Fuse Privilege Escalation in USERNS Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20211018 Re: CVE-2021-3847: OverlayFS - Potential Privilege Escalation using overlays copy_up Source: XF Type: UNKNOWN linux-kernel-cve20161575-priv-esc(114464) Source: CONFIRM Type: Third Party Advisory https://launchpad.net/bugs/1534961 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |