Incorrect Permission Assignment for Critical Resource Affecting kernel-kdump-devel package, versions <0:3.10.0-327.28.2.el7
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-KERNELKDUMPDEVEL-4602045
- published 26 Jul 2021
- disclosed 4 Dec 2015
Introduced: 4 Dec 2015
CVE-2015-8660 Open this link in a new tabHow to fix?
Upgrade RHEL:7
kernel-kdump-devel
to version 0:3.10.0-327.28.2.el7 or higher.
This issue was patched in RHSA-2016:1539
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-kdump-devel
package and not the kernel-kdump-devel
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.
References
- http://www.securityfocus.com/bid/79671
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=acff81ec2c79492b180fade3c2894425cd35a545
- https://bugzilla.redhat.com/show_bug.cgi?id=1291329
- https://github.com/torvalds/linux/commit/acff81ec2c79492b180fade3c2894425cd35a545
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- https://access.redhat.com/security/cve/CVE-2015-8660
- https://www.exploit-db.com/exploits/39166/
- https://www.exploit-db.com/exploits/39230/
- https://www.exploit-db.com/exploits/40688/
- http://packetstormsecurity.com/files/135151/Ubuntu-14.04-LTS-15.10-overlayfs-Local-Root.html
- http://www.openwall.com/lists/oss-security/2015/12/23/5
- http://rhn.redhat.com/errata/RHSA-2016-1532.html
- http://rhn.redhat.com/errata/RHSA-2016-1539.html
- http://rhn.redhat.com/errata/RHSA-2016-1541.html
- https://access.redhat.com/errata/RHSA-2016:1539
- http://www.securitytracker.com/id/1034548
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html
- http://www.ubuntu.com/usn/USN-2857-1
- http://www.ubuntu.com/usn/USN-2857-2
- http://www.ubuntu.com/usn/USN-2858-1
- http://www.ubuntu.com/usn/USN-2858-2
- http://www.ubuntu.com/usn/USN-2858-3
- https://www.exploit-db.com/exploits/39166