First published: Mon Dec 14 2015(Updated: )
A security issue was fixed in kernel 4.4-rc4 resolving the bypassing of filesystem permission checks in overlayfs during the initial copy_up. Upstream patch: <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=acff81ec2c79492b180fade3c2894425cd35a545">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=acff81ec2c79492b180fade3c2894425cd35a545</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1291329 is classified as important due to the potential for unauthorized access.
To fix REDHAT-BUG-1291329, update the kernel to a version that includes the upstream patch addressing the vulnerability.
The systems affected by REDHAT-BUG-1291329 include those running the vulnerable versions of the Linux kernel.
The nature of the vulnerability in REDHAT-BUG-1291329 involves bypassing filesystem permission checks in overlayfs during initial copy_up.
Yes, REDHAT-BUG-1291329 is associated with the CVE identifier CVE-2015-8660.