summaryrefslogtreecommitdiffstats
path: root/active/CVE-2021-3493
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-04-16 16:52:23 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2021-04-16 16:52:23 +0200
commitdf4e9100679dfd178477d83840fedec6c5273eb2 (patch)
tree25c6c38c86e9e4ea6808c7f7ccfac7f66cf411f7 /active/CVE-2021-3493
parent71eac7f7ab6f2cf60be6d8c0dc7244fc04a6fe64 (diff)
Add CVE-2021-3493
Diffstat (limited to 'active/CVE-2021-3493')
-rw-r--r--active/CVE-2021-349314
1 files changed, 14 insertions, 0 deletions
diff --git a/active/CVE-2021-3493 b/active/CVE-2021-3493
new file mode 100644
index 00000000..06ad2358
--- /dev/null
+++ b/active/CVE-2021-3493
@@ -0,0 +1,14 @@
+Description: overlayfs fs caps privilege escalation
+References:
+ https://www.openwall.com/lists/oss-security/2021/04/16/1
+Notes:
+ carnil> Debian ships as well a patch to allow enable unprivileged
+ carnil> overlayfs mounts. Cf. #913880 present since 4.19.9-1 upload.
+Bugs:
+upstream: released (5.11-rc1) [7c03e2cda4a584cadc398e8f6641ca9988a39d52]
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+4.9-upstream-stable:
+sid: needed
+4.19-buster-security: needed
+4.9-stretch-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy