CVE-2021-3493

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:-:*:*:*

History

07 Jul 2023, 19:10

Type Values Removed Values Added
CWE CWE-269 CWE-863

Information

Published : 2021-04-17 05:15

Updated : 2024-02-28 18:28


NVD link : CVE-2021-3493

Mitre link : CVE-2021-3493

CVE.ORG link : CVE-2021-3493


JSON object : View

Products Affected

canonical

  • ubuntu_linux
CWE
CWE-863

Incorrect Authorization

CWE-270

Privilege Context Switching Error