CVE-2016-1576

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_core:15.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_touch:15.04:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Apr 2022, 17:59

Type Values Removed Values Added
References (CONFIRM) https://bugs.launchpad.net/bugs/1535150 - (CONFIRM) https://bugs.launchpad.net/bugs/1535150 - Third Party Advisory
References (MISC) http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/ - Exploit (MISC) http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/ - Exploit, Third Party Advisory
References (MISC) https://launchpadlibrarian.net/235300093/0005-overlayfs-Be-more-careful-about-copying-up-sxid-file.patch - (MISC) https://launchpadlibrarian.net/235300093/0005-overlayfs-Be-more-careful-about-copying-up-sxid-file.patch - Mailing List, Patch, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2016/02/24/8 - (MLIST) http://www.openwall.com/lists/oss-security/2016/02/24/8 - Mailing List, Third Party Advisory
References (CONFIRM) http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1576.html - (CONFIRM) http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1576.html - Third Party Advisory
References (MISC) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360 - (MISC) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360 - Mailing List, Patch, Vendor Advisory
References (MISC) https://launchpadlibrarian.net/235300225/0006-overlayfs-Propogate-nosuid-from-lower-and-upper-moun.patch - (MISC) https://launchpadlibrarian.net/235300225/0006-overlayfs-Propogate-nosuid-from-lower-and-upper-moun.patch - Mailing List, Patch, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/10/18/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/10/18/1 - Mailing List, Third Party Advisory
CWE CWE-264 NVD-CWE-noinfo

18 Oct 2021, 21:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/10/18/1 -

Information

Published : 2016-05-02 10:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-1576

Mitre link : CVE-2016-1576

CVE.ORG link : CVE-2016-1576


JSON object : View

Products Affected

linux

  • linux_kernel

canonical

  • ubuntu_core
  • ubuntu_linux
  • ubuntu_touch