CVE-2015-8660 (retired)

Priority
Description
The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel
through 4.3.3 attempts to merge distinct setattr operations, which allows
local users to bypass intended access restrictions and modify the
attributes of arbitrary overlay files via a crafted application.
Ubuntu-Description
Nathan Williams discovered that overlayfs in the Linux kernel incorrectly
handled setattr operations. A local unprivileged attacker could use this to
create files with administrative permission attributes and execute
arbitrary code with elevated privileges.
Notes
 jdstrand> android kernels (flo, goldfish, grouper, maguro, mako and manta) are
  not supported on the Ubuntu Touch 14.10 and earlier preview kernels
 jdstrand> linux-lts-saucy no longer receives official support
 jdstrand> linux-lts-quantal no longer receives official support
 sbeattie> kernel 3.16 and older not affected
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.3.0-6.17)
Patches:
Introduced by e9be9d5e76e34872f0c37d72e25bc27fe9e2c54cFixed by acff81ec2c79492b180fade3c2894425cd35a545
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1001.10)
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1003.3)
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Product
linux-krillin:not-affected
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1003.4)
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1012.12)
Package
Upstream:released (4.4~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Product
linux-vegetahd:not-affected
More Information

Updated: 2019-09-19 15:56:10 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)