Difference between revisions of "Enhome"
From PwnWiki
| Line 21: | Line 21: | ||
{| cellspacing="2px" | {| cellspacing="2px" | ||
| valign="middle" | [[Image:Trans.jpeg|50px]] | | valign="middle" | [[Image:Trans.jpeg|50px]] | ||
| − | | Other | + | | Other languages: |
| [https://www.pwnwiki.org/index.php?title=Eshome Español] [https://www.pwnwiki.org/index.php?title=Ruhome русский] [https://www.pwnwiki.org/index.php?title=Enhome English] [https://www.pwnwiki.org/index.php?title=Uahome Український] [https://www.pwnwiki.org/index.php?title=Main_Page 中文] | | [https://www.pwnwiki.org/index.php?title=Eshome Español] [https://www.pwnwiki.org/index.php?title=Ruhome русский] [https://www.pwnwiki.org/index.php?title=Enhome English] [https://www.pwnwiki.org/index.php?title=Uahome Український] [https://www.pwnwiki.org/index.php?title=Main_Page 中文] | ||
|} | |} | ||
Revision as of 15:49, 30 March 2021
|
|
News Broadcast
CVE-2021-3493The OverlayFS vulnerability allows local users under Ubuntu to gain root privileges. An Ubuntu specific issue in the overlayfs file system in the Linux kernel, in which it did not correctly validate the application regarding the file system function of the user namespace. Since Ubuntu comes with a patch that allows unprivileged overlayfs to mount, local attackers can use it to gain higher privileges. Affected versionUbuntu 20.10 Ubuntu 20.04 LTS Ubuntu 18.04 LTS Ubuntu 16.04 LTS Ubuntu 14.04 ESM Repair suggestions
|
|
Penetration test data
NULL
|
Join us
|