[kernel-sec-discuss] r4194 - active

Ben Hutchings benh at moszumanska.debian.org
Sat Feb 27 10:02:34 UTC 2016


Author: benh
Date: 2016-02-27 10:02:34 +0000 (Sat, 27 Feb 2016)
New Revision: 4194

Modified:
   active/CVE-2016-1575
   active/CVE-2016-1576
Log:
Add note about aufs issues related to CVE-2016-157{5,6}

Modified: active/CVE-2016-1575
===================================================================
--- active/CVE-2016-1575	2016-02-27 09:34:35 UTC (rev 4193)
+++ active/CVE-2016-1575	2016-02-27 10:02:34 UTC (rev 4194)
@@ -7,6 +7,8 @@
  bwh> overlayfs within a user namespace (only allowed in Ubuntu).  But it's
  bwh> possible that an administrator might accidentally set up a
  bwh> configuration that is exploitable.
+ bwh> jessie is affected by a similar issue with aufs substituting for
+ bwh> overlayfs.
 Bugs:
 upstream:
 3.16-upstream-stable: N/A "Vulnerable code not present, introduced in e9be9d5e76e34872f0c37d72e25bc27fe9e2c54c (v3.18-rc2)"

Modified: active/CVE-2016-1576
===================================================================
--- active/CVE-2016-1576	2016-02-27 09:34:35 UTC (rev 4193)
+++ active/CVE-2016-1576	2016-02-27 10:02:34 UTC (rev 4194)
@@ -7,6 +7,8 @@
  bwh> overlayfs and FUSE within a user namespace (only allowed in Ubuntu).
  bwh> But it's possible that an administrator might accidentally set up a
  bwh> configuration that is exploitable.
+ bwh> jessie is affected by a similar issue with aufs substituting for
+ bwh> overlayfs.
 Bugs:
 upstream:
 3.16-upstream-stable: N/A "Vulnerable code not present, introduced in e9be9d5e76e34872f0c37d72e25bc27fe9e2c54c (v3.18-rc2)"




More information about the kernel-sec-discuss mailing list