The aufs module for the Linux kernel 3.x and 4.x does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/ | third party advisory exploit |
http://www.openwall.com/lists/oss-security/2016/02/24/9 | mailing list third party advisory exploit |
https://sourceforge.net/p/aufs/mailman/message/34864744/ | third party advisory mailing list |
http://www.securityfocus.com/bid/96838 | third party advisory vdb entry |