The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
References
Link | Resource |
---|---|
http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/ | Exploit Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/02/24/9 | Exploit Mailing List Third Party Advisory |
https://sourceforge.net/p/aufs/mailman/message/34864744/ | Third Party Advisory |
http://www.securityfocus.com/bid/96839 | Broken Link |
http://www.openwall.com/lists/oss-security/2021/10/18/1 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2016-05-02 03:59
Updated : 2022-04-18 10:59
NVD link : CVE-2016-2853
Mitre link : CVE-2016-2853
JSON object : View
CWE
CWE-269
Improper Privilege Management
Products Affected
linux
- linux_kernel