First published: Mon Feb 22 2016(Updated: )
halfdog discovered that OverlayFS, when mounting on top of a FUSE mount, incorrectly propagated file attributes, including setuid. A local unprivileged attacker could use this to gain privileges. (CVE-2016-1576) halfdog discovered that OverlayFS in the Linux kernel incorrectly propagated security sensitive extended attributes, such as POSIX ACLs. A local unprivileged attacker could use this to gain privileges. (CVE-2016-1575) It was discovered that the Linux kernel did not properly enforce rlimits for file descriptors sent over UNIX domain sockets. A local attacker could use this to cause a denial of service. (CVE-2013-4312) It was discovered that the Linux kernel's Filesystem in Userspace (FUSE) implementation did not handle initial zero length segments properly. A local attacker could use this to cause a denial of service (unkillable task). (CVE-2015-8785) Andy Lutomirski discovered a race condition in the Linux kernel's translation lookaside buffer (TLB) handling of flush events. A local attacker could use this to cause a denial of service or possibly leak sensitive information. (CVE-2016-2069)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.2.0-1025-raspi2 | <4.2.0-1025.32 | 4.2.0-1025.32 |
=15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this Linux kernel vulnerability is CVE-2016-1576.
CVE-2016-1576 allows a local unprivileged attacker to gain privileges.
An attacker can exploit CVE-2016-1576 by leveraging OverlayFS when mounting on top of a FUSE mount incorrectly propagated file attributes, including setuid.
Yes, there is a fix available for this vulnerability in the Linux kernel version 4.2.0-1025.32 (linux-image-4.2.0-1025-raspi2 package).
The severity of CVE-2016-1576 is high.