Difference between revisions of "Enhome"
From PwnWiki
| Line 22: | Line 22: | ||
| valign="middle" | [[Image:Trans.jpeg|50px]] | | valign="middle" | [[Image:Trans.jpeg|50px]] | ||
| Other language: | | Other language: | ||
| − | | [https://www.pwnwiki.org/index.php?title=Eshome Español] [https://www.pwnwiki.org/index.php?title=Ruhome русский] [https://www.pwnwiki.org/index.php?title=Enhome English] [https://www.pwnwiki.org/index.php?title=Uahome Український] | + | | [https://www.pwnwiki.org/index.php?title=Eshome Español] [https://www.pwnwiki.org/index.php?title=Ruhome русский] [https://www.pwnwiki.org/index.php?title=Enhome English] [https://www.pwnwiki.org/index.php?title=Uahome Український] [https://www.pwnwiki.org/index.php?title=Main_Page 中文] |
|} | |} | ||
|} | |} | ||
Revision as of 14:57, 22 March 2021
|
|
News Broadcast
CVE-2021-3493The OverlayFS vulnerability allows local users under Ubuntu to gain root privileges. An Ubuntu specific issue in the overlayfs file system in the Linux kernel, in which it did not correctly validate the application regarding the file system function of the user namespace. Since Ubuntu comes with a patch that allows unprivileged overlayfs to mount, local attackers can use it to gain higher privileges. Affected versionUbuntu 20.10 Ubuntu 20.04 LTS Ubuntu 18.04 LTS Ubuntu 16.04 LTS Ubuntu 14.04 ESM Repair suggestions
|
|
Penetration test data
NULL
|
Join us
|