CVE-2015-1328

Priority
Description
The overlayfs implementation in the linux (aka Linux kernel) package before
3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions
for file creation in the upper filesystem directory, which allows local
users to obtain root access by leveraging a configuration in which
overlayfs is permitted in an arbitrary mount namespace.
Ubuntu-Description
Philip Pettersson discovered a privilege escalation when using overlayfs
mounts inside of user namespaces. A local user could exploit this flaw to
gain administrative privileges on the system.
Notes
tyhicksThis CVE is specific to Ubuntu since Ubuntu allows overlayfs mounts
inside of user namespaces
jdstrandandroid kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support
Package
Source: linux (LP Ubuntu Debian)
Upstream:not-affected
Ubuntu 16.04 ESM:not-affected
Ubuntu 14.04 ESM:released (3.13.0-55.92)
Ubuntu 20.04 FIPS Compliant:not-affected
Patches:
Introduced by
local-2015-1328-break
Fixed by
local-2015-1328-fix
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:not-affected
Ubuntu 16.04 ESM:not-affected
Ubuntu 14.04 ESM:not-affected
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE (trusty was ignored)
Ubuntu 20.04 FIPS Compliant:not-affected
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE (trusty was ignored)
Ubuntu 20.04 FIPS Compliant:not-affected
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE (trusty was ignored)
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 16.04 ESM:not-affected
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 16.04 ESM:not-affected
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE (trusty was released [3.16.0-41.55~14.04.1])
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE (trusty was released [3.19.0-21.21~14.04.1])
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE (trusty was not-affected)
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:not-affected
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE (trusty was ignored)
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE (trusty was ignored)
Ubuntu 20.04 FIPS Compliant:not-affected
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE (trusty was ignored)
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:not-affected
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:not-affected
Patches:
Package
Upstream:not-affected
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
More Information

Updated: 2022-04-13 12:04:27 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)