CVE-2021-3493
Linux Kernel Privilege Escalation Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
13Exploited in Wild
YesDecision
Descriptions
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
La implementación de overlayfs en el kernel de Linux no comprobó apropiadamente con respecto a los espacios de nombre de los usuarios, la configuración de las capacidades de los archivos en un sistema de archivos subyacente. Debido a la combinación de los espacios de nombre de usuarios no privilegiados junto con un parche incluido en el kernel de Ubuntu para permitir montajes de superposición no privilegiados, un atacante podría usar esto para alcanzar privilegios elevados
The overlayfs stacking file system in Linux kernel does not properly validate the application of file capabilities against user namespaces, which could lead to privilege escalation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-04-12 CVE Reserved
- 2021-04-16 CVE Published
- 2021-04-20 First Exploit
- 2022-10-20 Exploited in Wild
- 2022-11-10 KEV Due Date
- 2024-09-17 CVE Updated
- 2024-09-20 EPSS Updated
CWE
- CWE-270: Privilege Context Switching Error
- CWE-863: Incorrect Authorization
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html | Third Party Advisory | |
https://www.openwall.com/lists/oss-security/2021/04/16/1 | Mailing List | |
- |
URL | Date | SRC |
---|---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 | 2023-07-07 |
URL | Date | SRC |
---|---|---|
https://ubuntu.com/security/notices/USN-4917-1 | 2023-07-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | < 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version " < 18.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | >= 18.04.1 < 20.04 Search vendor "Canonical" for product "Ubuntu Linux" and version " >= 18.04.1 < 20.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | < 20.10 Search vendor "Canonical" for product "Ubuntu Linux" and version " < 20.10" | - |
Affected
|