CVE-2021-3493

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:-:*:*:*

History

21 Nov 2024, 06:21

Type Values Removed Values Added
CVSS v2 : 7.2
v3 : 7.8
v2 : 7.2
v3 : 8.8
References () http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 - Mailing List, Patch, Third Party Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 - Mailing List, Patch, Third Party Advisory
References () https://ubuntu.com/security/notices/USN-4917-1 - Vendor Advisory () https://ubuntu.com/security/notices/USN-4917-1 - Vendor Advisory
References () https://www.openwall.com/lists/oss-security/2021/04/16/1 - Mailing List, Third Party Advisory () https://www.openwall.com/lists/oss-security/2021/04/16/1 - Mailing List, Third Party Advisory

07 Jul 2023, 19:10

Type Values Removed Values Added
CWE CWE-269 CWE-863

Information

Published : 2021-04-17 05:15

Updated : 2024-11-21 06:21


NVD link : CVE-2021-3493

Mitre link : CVE-2021-3493

CVE.ORG link : CVE-2021-3493


JSON object : View

Products Affected

canonical

  • ubuntu_linux
CWE
CWE-270

Privilege Context Switching Error

CWE-863

Incorrect Authorization