Vulnerability Details : CVE-2016-1575
The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.
Products affected by CVE-2016-1575
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_core:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_touch:15.04:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1575
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 11 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1575
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2016-1575
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1575
-
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1575.html
CVE-2016-1575 in UbuntuThird Party Advisory
-
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2021/10/18/1
oss-security - Re: CVE-2021-3847: OverlayFS - Potential Privilege Escalation using overlays copy_upMailing List;Third Party Advisory
-
https://launchpad.net/bugs/1534961
Bug #1534961 “CVE-2016-1575” : Bugs : linux package : UbuntuThird Party Advisory
-
http://www.halfdog.net/Security/2016/UserNamespaceOverlayfsXattrSetgidPrivilegeEscalation/
User Namespaces Overlayfs Xattr Setgid Privilege EscalationExploit;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/02/24/7
oss-security - User Namespaces Overlayfs Xattr Setgid Privilege Escalation: OverlayfsMailing List;Third Party Advisory
Jump to