[kernel-sec-discuss] r4194 - active
Ben Hutchings
benh at moszumanska.debian.org
Sat Feb 27 10:02:34 UTC 2016
Author: benh
Date: 2016-02-27 10:02:34 +0000 (Sat, 27 Feb 2016)
New Revision: 4194
Modified:
active/CVE-2016-1575
active/CVE-2016-1576
Log:
Add note about aufs issues related to CVE-2016-157{5,6}
Modified: active/CVE-2016-1575
===================================================================
--- active/CVE-2016-1575 2016-02-27 09:34:35 UTC (rev 4193)
+++ active/CVE-2016-1575 2016-02-27 10:02:34 UTC (rev 4194)
@@ -7,6 +7,8 @@
bwh> overlayfs within a user namespace (only allowed in Ubuntu). But it's
bwh> possible that an administrator might accidentally set up a
bwh> configuration that is exploitable.
+ bwh> jessie is affected by a similar issue with aufs substituting for
+ bwh> overlayfs.
Bugs:
upstream:
3.16-upstream-stable: N/A "Vulnerable code not present, introduced in e9be9d5e76e34872f0c37d72e25bc27fe9e2c54c (v3.18-rc2)"
Modified: active/CVE-2016-1576
===================================================================
--- active/CVE-2016-1576 2016-02-27 09:34:35 UTC (rev 4193)
+++ active/CVE-2016-1576 2016-02-27 10:02:34 UTC (rev 4194)
@@ -7,6 +7,8 @@
bwh> overlayfs and FUSE within a user namespace (only allowed in Ubuntu).
bwh> But it's possible that an administrator might accidentally set up a
bwh> configuration that is exploitable.
+ bwh> jessie is affected by a similar issue with aufs substituting for
+ bwh> overlayfs.
Bugs:
upstream:
3.16-upstream-stable: N/A "Vulnerable code not present, introduced in e9be9d5e76e34872f0c37d72e25bc27fe9e2c54c (v3.18-rc2)"
More information about the kernel-sec-discuss
mailing list