The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
Link | Tags |
---|---|
https://launchpadlibrarian.net/235300093/0005-overlayfs-Be-more-careful-about-copying-up-sxid-file.patch | patch mailing list third party advisory |
https://launchpadlibrarian.net/235300225/0006-overlayfs-Propogate-nosuid-from-lower-and-upper-moun.patch | patch mailing list third party advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360 | patch vendor advisory mailing list |
https://bugs.launchpad.net/bugs/1535150 | third party advisory |
http://www.openwall.com/lists/oss-security/2016/02/24/8 | third party advisory mailing list |
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1576.html | third party advisory |
http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/ | third party advisory exploit |
http://www.openwall.com/lists/oss-security/2021/10/18/1 | third party advisory mailing list |