kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #153924
[Bug 1528904] Re: overlay setattr vulnerability
** Description changed:
- http://www.openwall.com/lists/oss-security/2015/12/23/5
-
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=acff81ec2c79492b180fade3c2894425cd35a545
-
- This allows unprivileged users to change attributes on root-owned files.
+ The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel
+ through 4.3.3 attempts to merge distinct setattr operations, which
+ allows local users to bypass intended access restrictions and modify the
+ attributes of arbitrary overlay files via a crafted application.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1528904
Title:
overlay setattr vulnerability
Status in linux package in Ubuntu:
Triaged
Status in linux-armadaxp package in Ubuntu:
New
Status in linux-flo package in Ubuntu:
New
Status in linux-goldfish package in Ubuntu:
New
Status in linux-lts-quantal package in Ubuntu:
New
Status in linux-lts-raring package in Ubuntu:
New
Status in linux-lts-saucy package in Ubuntu:
New
Status in linux-lts-trusty package in Ubuntu:
New
Status in linux-lts-utopic package in Ubuntu:
New
Status in linux-lts-vivid package in Ubuntu:
New
Status in linux-lts-wily package in Ubuntu:
New
Status in linux-mako package in Ubuntu:
New
Status in linux-manta package in Ubuntu:
New
Status in linux-raspi2 package in Ubuntu:
New
Status in linux-ti-omap4 package in Ubuntu:
New
Bug description:
The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel
through 4.3.3 attempts to merge distinct setattr operations, which
allows local users to bypass intended access restrictions and modify
the attributes of arbitrary overlay files via a crafted application.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1528904/+subscriptions