The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360 | patch vendor advisory |
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1575.html | third party advisory |
https://launchpad.net/bugs/1534961 | third party advisory |
http://www.halfdog.net/Security/2016/UserNamespaceOverlayfsXattrSetgidPrivilegeEscalation/ | third party advisory exploit |
http://www.openwall.com/lists/oss-security/2016/02/24/7 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2021/10/18/1 | third party advisory mailing list |