CVE-2016-2853

The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Apr 2022, 17:59

Type Values Removed Values Added
References (MLIST) http://www.openwall.com/lists/oss-security/2021/10/18/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/10/18/1 - Mailing List, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/96839 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/96839 - Broken Link

18 Oct 2021, 21:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/10/18/1 -

Information

Published : 2016-05-02 10:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-2853

Mitre link : CVE-2016-2853

CVE.ORG link : CVE-2016-2853


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-269

Improper Privilege Management