CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
78.3%
The overlayfs implementation in the linux kernel did not properly validate
with respect to user namespaces the setting of file capabilities on files
in an underlying file system. Due to the combination of unprivileged user
namespaces along with a patch carried in the Ubuntu kernel to allow
unprivileged overlay mounts, an attacker could use this to gain elevated
privileges.
Author | Note |
---|---|
sbeattie | issue is specific to Ubuntu or any other distribution that patched the kernel to allow unprivileged overlay mounts, prior to the 5.11 commit (459c7c565ac36b) that permits it upstream. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | <ย 4.15.0-142.146 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | <ย 5.4.0-72.80 | UNKNOWN |
ubuntu | 20.10 | noarch | linux | <ย 5.8.0-50.56 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | <ย 4.4.0-209.241 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | <ย 4.15.0-1099.106 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | <ย 5.4.0-1045.47 | UNKNOWN |
ubuntu | 20.10 | noarch | linux-aws | <ย 5.8.0-1030.32 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | <ย 4.4.0-1091.95 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | <ย 4.4.0-1127.141 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | <ย 5.4.0-1045.47~18.04.1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2021-3493
nvd.nist.gov/vuln/detail/CVE-2021-3493
security-tracker.debian.org/tracker/CVE-2021-3493
ubuntu.com/security/notices/USN-4915-1
ubuntu.com/security/notices/USN-4916-1
ubuntu.com/security/notices/USN-4917-1
www.cve.org/CVERecord?id=CVE-2021-3493
www.openwall.com/lists/oss-security/2021/04/16/1
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
78.3%