Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3493
HistoryApr 15, 2021 - 12:00 a.m.

CVE-2021-3493

2021-04-1500:00:00
ubuntu.com
ubuntu.com
21

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.006 Low

EPSS

Percentile

78.0%

The overlayfs implementation in the linux kernel did not properly validate
with respect to user namespaces the setting of file capabilities on files
in an underlying file system. Due to the combination of unprivileged user
namespaces along with a patch carried in the Ubuntu kernel to allow
unprivileged overlay mounts, an attacker could use this to gain elevated
privileges.

Notes

Author Note
sbeattie issue is specific to Ubuntu or any other distribution that patched the kernel to allow unprivileged overlay mounts, prior to the 5.11 commit (459c7c565ac36b) that permits it upstream.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlinux<ย 4.15.0-142.146UNKNOWN
ubuntu20.04noarchlinux<ย 5.4.0-72.80UNKNOWN
ubuntu20.10noarchlinux<ย 5.8.0-50.56UNKNOWN
ubuntu16.04noarchlinux<ย 4.4.0-209.241UNKNOWN
ubuntu18.04noarchlinux-aws<ย 4.15.0-1099.106UNKNOWN
ubuntu20.04noarchlinux-aws<ย 5.4.0-1045.47UNKNOWN
ubuntu20.10noarchlinux-aws<ย 5.8.0-1030.32UNKNOWN
ubuntu14.04noarchlinux-aws<ย 4.4.0-1091.95) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchlinux-aws<ย 4.4.0-1127.141UNKNOWN
ubuntu18.04noarchlinux-aws-5.4<ย 5.4.0-1045.47~18.04.1UNKNOWN
Rows per page:
1-10 of 601

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.006 Low

EPSS

Percentile

78.0%