diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2023-03-07 20:24:02 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2023-03-07 20:24:02 +0100 |
commit | 878bee4528e69eaa7d160d18c650caa693e2422f (patch) | |
tree | 811b878dc15e8887b14ac7eba369400899446f60 /active/CVE-2021-3847 | |
parent | 7d0d11e0c6f72df172cb26ea46afdd5e49ae4de6 (diff) |
Update information on CVE-2021-3847
Diffstat (limited to 'active/CVE-2021-3847')
-rw-r--r-- | active/CVE-2021-3847 | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/active/CVE-2021-3847 b/active/CVE-2021-3847 index 2887cd4d..490f7f03 100644 --- a/active/CVE-2021-3847 +++ b/active/CVE-2021-3847 @@ -2,11 +2,14 @@ Description: ovl: Copy-up from nosuid lower to suid upper could allow priv-esc References: https://bugzilla.redhat.com/show_bug.cgi?id=2009704 https://www.openwall.com/lists/oss-security/2021/10/14/3 + https://www.openwall.com/lists/oss-security/2021/10/20/1 Notes: bwh> Only likely to be exploitable after commit 459c7c565ac3 bwh> "ovl: unprivieged mounts" in 5.11-rc1, or if the bwh> Debian-specific module parameter permit_mounts_in_userns bwh> is enabled. + carnil> According to the followups, is considered a misconfiguration of + carnil> the mount, and not a kernel bug. Should we retire the CVE? Bugs: upstream: needed 5.10-upstream-stable: needed |