Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-3493

Опубликовано: 17 апр. 2021
Источник: nvd
CVSS3: 8.8
CVSS3: 7.8
CVSS2: 7.2
EPSS Высокий

Описание

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*
Версия до 18.04 (исключая)
cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*
Версия от 18.04.1 (включая) до 20.04 (исключая)
Конфигурация 2
cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:-:*:*:*
Версия до 20.10 (исключая)

EPSS

Процентиль: 99%
0.76767
Высокий

8.8 High

CVSS3

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-270
CWE-863

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 5 лет назад

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

CVSS3: 7.4
redhat
почти 5 лет назад

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

CVSS3: 8.8
debian
почти 5 лет назад

The overlayfs implementation in the linux kernel did not properly vali ...

CVSS3: 7.8
github
больше 3 лет назад

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

CVSS3: 7.8
fstec
почти 5 лет назад

Уязвимость компонента overlayfs ядра операционной системы Linux, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 99%
0.76767
Высокий

8.8 High

CVSS3

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-270
CWE-863