vulnerability
Ubuntu: (Multiple Advisories) (CVE-2015-1328): Linux kernel vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Nov 28, 2016 | Nov 8, 2024 | Apr 14, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Nov 28, 2016
Added
Nov 8, 2024
Modified
Apr 14, 2025
Description
Philip Pettersson discovered a privilege escalation when using overlayfs
mounts inside of user namespaces. A local user could exploit this flaw to
gain administrative privileges on the system.
Solution(s)
ubuntu-upgrade-linux-image-3-13-0-55-genericubuntu-upgrade-linux-image-3-13-0-55-generic-lpaeubuntu-upgrade-linux-image-3-13-0-55-lowlatencyubuntu-upgrade-linux-image-3-13-0-55-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-55-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-55-powerpc-smpubuntu-upgrade-linux-image-3-13-0-55-powerpc64-embubuntu-upgrade-linux-image-3-13-0-55-powerpc64-smpubuntu-upgrade-linux-image-3-16-0-41-genericubuntu-upgrade-linux-image-3-16-0-41-generic-lpaeubuntu-upgrade-linux-image-3-16-0-41-lowlatencyubuntu-upgrade-linux-image-3-16-0-41-powerpc-e500mcubuntu-upgrade-linux-image-3-16-0-41-powerpc-smpubuntu-upgrade-linux-image-3-16-0-41-powerpc64-embubuntu-upgrade-linux-image-3-16-0-41-powerpc64-smpubuntu-upgrade-linux-image-3-19-0-21-genericubuntu-upgrade-linux-image-3-19-0-21-generic-lpaeubuntu-upgrade-linux-image-3-19-0-21-lowlatencyubuntu-upgrade-linux-image-3-19-0-21-powerpc-e500mcubuntu-upgrade-linux-image-3-19-0-21-powerpc-smpubuntu-upgrade-linux-image-3-19-0-21-powerpc64-embubuntu-upgrade-linux-image-3-19-0-21-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-1466-omap4ubuntu-upgrade-linux-image-3-2-0-86-genericubuntu-upgrade-linux-image-3-2-0-86-generic-paeubuntu-upgrade-linux-image-3-2-0-86-highbankubuntu-upgrade-linux-image-3-2-0-86-omapubuntu-upgrade-linux-image-3-2-0-86-powerpc-smpubuntu-upgrade-linux-image-3-2-0-86-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-86-virtual
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.