|
Message-ID: <4095-1634579571.798266@3V_h.d15S.uAgJ> Date: Mon, 18 Oct 2021 17:52:51 +0000 From: halfdog <me@...fdog.net> To: Alon Zahavi <Alon.Zahavi@...erark.com> cc: oss-security@...ts.openwall.com Subject: Re: CVE-2021-3847: OverlayFS - Potential Privilege Escalation using overlays copy_up Alon Zahavi writes: > > After disclosing the issue with the linux-distros mailing list, > I am reporting the security issue publicly to here. There is > no patch available and may not be available for a long time > because the kernel can't enforce the mitigation proposed, as > that would be a layering violation and could also possibly > cause a regression. This vulnerability was attached with > CVE-2021-3847. Here is the report that was initially sent: > ... Just funny, just hours before this mail I got 3 mails on different overlayfs copy-up vuln, e.g. """ The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are subscribed to the bug report. https://bugs.launchpad.net/bugs/1534961 """ ... [Bug 1534961] Re: CVE-2016-1575 [Bug 1547400] Re: CVE-2016-2853 [Bug 1535150] Re: CVE-2016-1576 So it is 5 years and not so much changed :-) Overlayfs and alike where lower privileged user can simultaneously access lower/upper AND the mounted file system is extremely dangerous and prone to so many vulns, that nobody should use/allow that. hd
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.