CVE-2021-3493
Linux Kernel Privilege Escalation Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
18Exploited in Wild
YesDecision
Descriptions
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
La implementación de overlayfs en el kernel de Linux no comprobó apropiadamente con respecto a los espacios de nombre de los usuarios, la configuración de las capacidades de los archivos en un sistema de archivos subyacente. Debido a la combinación de los espacios de nombre de usuarios no privilegiados junto con un parche incluido en el kernel de Ubuntu para permitir montajes de superposición no privilegiados, un atacante podría usar esto para alcanzar privilegios elevados
It was discovered that the overlayfs implementation in the Linux kernel did not properly validate the application of file system capabilities with respect to user namespaces. A local attacker could use this to gain elevated privileges. Vincent Dehors discovered that the shiftfs file system in the Ubuntu Linux kernel did not properly handle faults in copy_from_user when passing through ioctls to an underlying file system. A local attacker could use this to cause a denial of service or execute arbitrary code. Various other issues were also addressed.
The overlayfs stacking file system in Linux kernel does not properly validate the application of file capabilities against user namespaces, which could lead to privilege escalation.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2021-04-12 CVE Reserved
- 2021-04-16 CVE Published
- 2021-04-20 First Exploit
- 2022-10-20 Exploited in Wild
- 2022-11-10 KEV Due Date
- 2025-02-07 CVE Updated
- 2025-03-31 EPSS Updated
CWE
- CWE-270: Privilege Context Switching Error
- CWE-863: Incorrect Authorization
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html | Third Party Advisory |
|
https://www.openwall.com/lists/oss-security/2021/04/16/1 | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 | 2023-07-07 |
URL | Date | SRC |
---|---|---|
https://ubuntu.com/security/notices/USN-4917-1 | 2023-07-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | < 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version " < 18.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | >= 18.04.1 < 20.04 Search vendor "Canonical" for product "Ubuntu Linux" and version " >= 18.04.1 < 20.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | < 20.10 Search vendor "Canonical" for product "Ubuntu Linux" and version " < 20.10" | - |
Affected
|