Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-1575

Severity
7.8HIGH
EPSS
0.5%
top 33.01%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 2
Latest updateMay 13

Description

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages8 packages

Debianlinux< 4.5.1-1+3
Ubuntulinux< 3.13.0-79.123
Ubuntulinux-lts-wily< 4.2.0-30.35~14.04.1
Ubuntulinux-lts-vivid< 3.19.0-51.57~14.04.1

Also affects: Ubuntu Linux 12.04, 14.04, 15.10, 16.04, 16.10

Patches

🔴Vulnerability Details

7
GHSA
GHSA-mgq6-h57w-6g82: The overlayfs implementation in the Linux kernel through 42022-05-13
OSV
CVE-2016-1575: The overlayfs implementation in the Linux kernel through 42016-05-02
CVEList
CVE-2016-1575: The overlayfs implementation in the Linux kernel through 42016-05-02
OSV
linux-lts-utopic vulnerabilities2016-02-22
OSV
linux-lts-vivid vulnerabilities2016-02-22

💥Exploits & PoCs

1
Exploit-DB
Ubuntu 14.04/15.10 - User Namespace Overlayfs Xattr SetGID Privilege Escalation2016-11-22

📋Vendor Advisories

9
Ubuntu
Linux kernel vulnerabilities2016-02-22
Ubuntu
Linux kernel (Vivid HWE) vulnerabilities2016-02-22
Ubuntu
Linux kernel (Raspberry Pi 2) vulnerabilities2016-02-22
Ubuntu
Linux kernel (Utopic HWE) vulnerabilities2016-02-22
Ubuntu
Linux kernel (Wily HWE) vulnerabilities2016-02-22
CVE-2016-1575 (HIGH CVSS 7.8) | The overlayfs implementation in the | cvebase.io