Логотип exploitDog
bind:CVE-2021-3493
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-3493

Количество 6

Количество 6

ubuntu логотип

CVE-2021-3493

почти 5 лет назад

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

CVSS3: 8.8
EPSS: Высокий
redhat логотип

CVE-2021-3493

почти 5 лет назад

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

CVSS3: 7.4
EPSS: Высокий
nvd логотип

CVE-2021-3493

почти 5 лет назад

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

CVSS3: 8.8
EPSS: Высокий
debian логотип

CVE-2021-3493

почти 5 лет назад

The overlayfs implementation in the linux kernel did not properly vali ...

CVSS3: 8.8
EPSS: Высокий
github логотип

GHSA-2fj2-4h38-3c72

больше 3 лет назад

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

CVSS3: 7.8
EPSS: Высокий
fstec логотип

BDU:2021-04861

почти 5 лет назад

Уязвимость компонента overlayfs ядра операционной системы Linux, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-3493

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

CVSS3: 8.8
77%
Высокий
почти 5 лет назад
redhat логотип
CVE-2021-3493

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

CVSS3: 7.4
77%
Высокий
почти 5 лет назад
nvd логотип
CVE-2021-3493

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

CVSS3: 8.8
77%
Высокий
почти 5 лет назад
debian логотип
CVE-2021-3493

The overlayfs implementation in the linux kernel did not properly vali ...

CVSS3: 8.8
77%
Высокий
почти 5 лет назад
github логотип
GHSA-2fj2-4h38-3c72

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

CVSS3: 7.8
77%
Высокий
больше 3 лет назад
fstec логотип
BDU:2021-04861

Уязвимость компонента overlayfs ядра операционной системы Linux, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
77%
Высокий
почти 5 лет назад

Уязвимостей на страницу