Back to bug 2009704

Who When What Removed Added
Marian Rehak 2021-10-01 11:48:36 UTC CC security-response-team
Marian Rehak 2021-10-01 11:49:37 UTC Blocks 2009706
Marian Rehak 2021-10-01 11:52:29 UTC Summary EMBARGOED CVE-2021-3847 kernel: low-privileged user prigileges escalation EMBARGOED CVE-2021-3847 kernel: low-privileged user privileges escalation
Marian Rehak 2021-10-01 11:52:46 UTC Blocks 2009708
Alasdair Kergon 2021-10-04 13:19:28 UTC CC agk
Stoyan Nikolov 2021-10-05 09:48:03 UTC CC michal.skrivanek, mperina, nobody, sbonazzo
Alex 2021-10-06 15:28:27 UTC Severity high medium
Priority high medium
Alex 2021-10-06 15:30:26 UTC Depends On 2011441, 2011439, 2011440
Alex 2021-10-07 09:14:31 UTC Comment 4 updated
Alex 2021-10-07 09:14:57 UTC CC allarkin
Alex 2021-10-13 13:03:52 UTC Doc Text A flaw unauthorized access to the execution of the setuid capable file in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to crash the system or escalate their privileges on the system.
Eric Christensen 2021-10-13 14:08:40 UTC Doc Text A flaw unauthorized access to the execution of the setuid capable file in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to crash the system or escalate their privileges on the system. An unauthorized access to the execution of the setuid capable file flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to crash the system or escalate their privileges on the system.
Alex 2021-10-13 15:11:45 UTC Doc Text An unauthorized access to the execution of the setuid capable file flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to crash the system or escalate their privileges on the system. An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system.
Guilherme de Almeida Suckevicz 2021-10-14 19:31:53 UTC CC adscvr, airlied, alciregi, bskeggs, hdegoede, jarodwilson, jeremy, jglisse, jonathan, josef, jwboyer, kernel-maint, kernel-mgr, linville, masami256, mchehab, steved
Summary EMBARGOED CVE-2021-3847 kernel: low-privileged user privileges escalation CVE-2021-3847 kernel: low-privileged user privileges escalation
Group security, qe_staff
Deadline 2021-09-13
Guilherme de Almeida Suckevicz 2021-10-14 19:32:19 UTC Depends On 2014278
Stoyan Nikolov 2021-10-15 06:32:51 UTC CC michal.skrivanek, mperina, nobody, sbonazzo
Red Hat Bugzilla 2022-06-04 08:04:32 UTC CC fpacheco
Red Hat Bugzilla 2022-07-16 03:20:21 UTC CC brdeoliv
Red Hat Bugzilla 2022-12-31 23:34:39 UTC CC fhrbata
Alex 2023-01-11 17:57:30 UTC Doc Text An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system. An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a file with capabilities from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system.
Red Hat Bugzilla 2023-04-01 08:39:41 UTC CC dhoward
Red Hat Bugzilla 2023-07-07 08:31:49 UTC Assignee security-response-team nobody
CC security-response-team

Back to bug 2009704