Your submission was sent successfully! Close

CVE-2016-1583

Published: 08 June 2016

The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.

From the Ubuntu security team

Jann Horn discovered that eCryptfs improperly attempted to use the mmap() handler of a lower filesystem that did not implement one, causing a recursive page fault to occur. A local unprivileged attacker could use to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges.

Priority

High

CVSS 3 base score: 7.8

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
Patches:
Introduced by 237fead619984cc48818fe12ee0ceada3f55b012
Fixed by e54ad7f1ee263ffa5a2de9c609d58dfa27b21cd9
Introduced by 746f1e558bc52b9693c1a1ecdab60f8392e5ff18
Fixed by 2f36db71009304b3f0b95afacd8eba1f9f046b87
Introduced by 0d9e26329b0c9263d4d9e0422d80a0e73268c52f
Fixed by 29d6455178a09e1dc340380c582b13356227e8df
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc3)