The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
References
Link | Resource |
---|---|
https://www.openwall.com/lists/oss-security/2021/04/16/1 | Mailing List Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 | Mailing List Patch Third Party Advisory |
https://ubuntu.com/security/notices/USN-4917-1 | Vendor Advisory |
http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
Information
Published : 2021-04-16 22:15
Updated : 2022-10-27 05:43
NVD link : CVE-2021-3493
Mitre link : CVE-2021-3493
JSON object : View
CWE
CWE-269
Improper Privilege Management
Products Affected
canonical
- ubuntu_linux