A flaw was found in the Linux kernel's OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1995249 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631 | Mailing List Patch Vendor Advisory |
https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631 | Patch Third Party Advisory |
https://ubuntu.com/security/CVE-2021-3732 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1995249 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631 | Mailing List Patch Vendor Advisory |
https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631 | Patch Third Party Advisory |
https://ubuntu.com/security/CVE-2021-3732 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1995249 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631 - Mailing List, Patch, Vendor Advisory | |
References | () https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631 - Patch, Third Party Advisory | |
References | () https://ubuntu.com/security/CVE-2021-3732 - Third Party Advisory |
13 Dec 2022, 19:50
Type | Values Removed | Values Added |
---|---|---|
Summary | A flaw was found in the Linux kernel's OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible. |
14 Mar 2022, 23:56
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631 - Patch, Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1995249 - Issue Tracking, Patch, Third Party Advisory | |
References | (MISC) https://ubuntu.com/security/CVE-2021-3732 - Third Party Advisory | |
References | (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631 - Mailing List, Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:linux:linux_kernel:5.14:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:rc5:*:*:*:*:*:* |
10 Mar 2022, 17:54
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-10 17:42
Updated : 2024-11-21 06:22
NVD link : CVE-2021-3732
Mitre link : CVE-2021-3732
CVE.ORG link : CVE-2021-3732
JSON object : View
Products Affected
linux
- linux_kernel
CWE