SB2016050228 - Input validation error in Linux kernel overlayfs
Published: May 2, 2016 Updated: July 11, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2016-1576)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to improper input validation within the MODULE_AUTHOR(), ovl_entry_real(), ovl_dir_cache(), ovl_show_options(), ovl_parse_opt() and ovl_fill_super() functions in fs/overlayfs/super.c, within the ovl_cleanup_whiteouts() function in fs/overlayfs/readdir.c, within the ovl_setattr() and ovl_permission() functions in fs/overlayfs/inode.c, within the ovl_copy_xattr() function in fs/overlayfs/copy_up.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://launchpadlibrarian.net/235300093/0005-overlayfs-Be-more-careful-about-copying-up-sxid-file.patch
- http://www.openwall.com/lists/oss-security/2016/02/24/8
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360
- http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/
- https://bugs.launchpad.net/bugs/1535150
- https://launchpadlibrarian.net/235300225/0006-overlayfs-Propogate-nosuid-from-lower-and-upper-moun.patch
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1576.html
- http://www.openwall.com/lists/oss-security/2021/10/18/1