summaryrefslogtreecommitdiffstats
path: root/active/CVE-2021-3847
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-03-07 20:24:02 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2023-03-07 20:24:02 +0100
commit878bee4528e69eaa7d160d18c650caa693e2422f (patch)
tree811b878dc15e8887b14ac7eba369400899446f60 /active/CVE-2021-3847
parent7d0d11e0c6f72df172cb26ea46afdd5e49ae4de6 (diff)
Update information on CVE-2021-3847
Diffstat (limited to 'active/CVE-2021-3847')
-rw-r--r--active/CVE-2021-38473
1 files changed, 3 insertions, 0 deletions
diff --git a/active/CVE-2021-3847 b/active/CVE-2021-3847
index 2887cd4d..490f7f03 100644
--- a/active/CVE-2021-3847
+++ b/active/CVE-2021-3847
@@ -2,11 +2,14 @@ Description: ovl: Copy-up from nosuid lower to suid upper could allow priv-esc
References:
https://bugzilla.redhat.com/show_bug.cgi?id=2009704
https://www.openwall.com/lists/oss-security/2021/10/14/3
+ https://www.openwall.com/lists/oss-security/2021/10/20/1
Notes:
bwh> Only likely to be exploitable after commit 459c7c565ac3
bwh> "ovl: unprivieged mounts" in 5.11-rc1, or if the
bwh> Debian-specific module parameter permit_mounts_in_userns
bwh> is enabled.
+ carnil> According to the followups, is considered a misconfiguration of
+ carnil> the mount, and not a kernel bug. Should we retire the CVE?
Bugs:
upstream: needed
5.10-upstream-stable: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy