Description
The overlayfs implementation in the linux (aka Linux kernel) package before
3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions
for file creation in the upper filesystem directory, which allows local
users to obtain root access by leveraging a configuration in which
overlayfs is permitted in an arbitrary mount namespace.
Ubuntu-Description
Philip Pettersson discovered a privilege escalation when using overlayfs
mounts inside of user namespaces. A local user could exploit this flaw to
gain administrative privileges on the system.
Notes
tyhicks | This CVE is specific to Ubuntu since Ubuntu allows overlayfs mounts
inside of user namespaces |
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support |
Package
Upstream: | not-affected
|
Ubuntu 16.04 ESM: | not-affected
|
Ubuntu 14.04 ESM: | released
(3.13.0-55.92)
|
Ubuntu 20.04 FIPS Compliant: | not-affected
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | not-affected
|
Ubuntu 16.04 ESM: | not-affected
|
Ubuntu 14.04 ESM: | not-affected
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | not-affected
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | not-affected
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 16.04 ESM: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 16.04 ESM: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
(trusty was released [3.16.0-41.55~14.04.1])
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
(trusty was released [3.19.0-21.21~14.04.1])
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
(trusty was not-affected)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | not-affected
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | not-affected
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | not-affected
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | not-affected
|
Patches:
Package
Upstream: | not-affected
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Updated: 2022-04-13 12:04:27 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)