diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2016-09-06 12:54:22 +0000 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2016-09-06 12:54:22 +0000 |
commit | 3aa9fe92a429b01ad8735d3b6bc05c271948e9fb (patch) | |
tree | 5356bc5c4065f0c0803ccd87f722272ea8a92195 /retired/CVE-2016-1575 | |
parent | 5e4b813bd86d296dc2ef2613e2b021869850c775 (diff) |
Retire now CVE-2016-157{5,6}
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4623 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-1575')
-rw-r--r-- | retired/CVE-2016-1575 | 18 |
1 files changed, 18 insertions, 0 deletions
diff --git a/retired/CVE-2016-1575 b/retired/CVE-2016-1575 new file mode 100644 index 00000000..b3d7a944 --- /dev/null +++ b/retired/CVE-2016-1575 @@ -0,0 +1,18 @@ +Description: Privilege escalation through userns, overlay mounts and setgid flag +References: + http://www.halfdog.net/Security/2016/UserNamespaceOverlayfsXattrSetgidPrivilegeEscalation/ +Notes: + bwh> The exploit depends on unprivileged users being able to create user + bwh> namespaces (disallowed by default in Debian) and being able to mount + bwh> overlayfs within a user namespace (only allowed in Ubuntu). But it's + bwh> possible that an administrator might accidentally set up a + bwh> configuration that is exploitable. + bwh> jessie is affected by a similar issue with aufs substituting for + bwh> overlayfs. +Bugs: +upstream: released (4.5-rc1) [e9f57ebcba563e0cd532926cab83c92bb4d79360] +3.16-upstream-stable: N/A "Vulnerable code not present, introduced in e9be9d5e76e34872f0c37d72e25bc27fe9e2c54c (v3.18-rc2)" +3.2-upstream-stable: N/A "Vulnerable code not present, introduced in e9be9d5e76e34872f0c37d72e25bc27fe9e2c54c (v3.18-rc2)" +sid: released (4.5.1-1) +3.16-jessie-security: N/A "Vulnerable code not present" +3.2-wheezy-security: N/A "Vulnerable code not present" |