Show plain JSON{"dataType": "CVE_RECORD", "containers": {"adp": [{"title": "CVE Program Container", "references": [{"url": "https://ubuntu.com/security/notices/USN-4917-1", "tags": ["x_refsource_MISC", "x_transferred"]}, {"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52", "tags": ["x_refsource_MISC", "x_transferred"]}, {"url": "https://www.openwall.com/lists/oss-security/2021/04/16/1", "tags": ["x_refsource_MISC", "x_transferred"]}, {"url": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html", "tags": ["x_refsource_MISC", "x_transferred"]}, {"url": "http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html", "tags": ["x_refsource_MISC", "x_transferred"]}, {"url": "http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html", "tags": ["x_refsource_MISC", "x_transferred"]}], "providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T16:53:17.827Z"}}, {"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2021-3493", "role": "CISA Coordinator", "options": [{"Exploitation": "active"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2025-02-07T12:30:18.913674Z"}}}, {"other": {"type": "kev", "content": {"dateAdded": "2022-10-20", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-3493"}}}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-02-07T12:30:35.814Z"}, "timeline": [{"lang": "en", "time": "2022-10-20T00:00:00+00:00", "value": "CVE-2021-3493 added to CISA KEV"}]}], "cna": {"source": {"discovery": "EXTERNAL"}, "credits": [{"lang": "en", "value": "An independent security researcher reporting to the SSD Secure Disclosure program"}], "metrics": [{"cvssV3_1": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}], "affected": [{"vendor": "Ubuntu", "product": "linux kernel", "versions": [{"status": "affected", "version": "5.8 kernel", "lessThan": "5.8.0-50.56", "versionType": "custom"}, {"status": "affected", "version": "5.4 kernel", "lessThan": "5.4.0-72.80", "versionType": "custom"}, {"status": "affected", "version": "4.15 kernel", "lessThan": "4.15.0-142.146", "versionType": "custom"}, {"status": "affected", "version": "4.4 kernel", "lessThan": "4.4.0-209.241", "versionType": "custom"}]}], "solutions": [{"lang": "en", "value": "Apply https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52"}], "datePublic": "2021-04-15T00:00:00.000Z", "references": [{"url": "https://ubuntu.com/security/notices/USN-4917-1", "tags": ["x_refsource_MISC"]}, {"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52", "tags": ["x_refsource_MISC"]}, {"url": "https://www.openwall.com/lists/oss-security/2021/04/16/1", "tags": ["x_refsource_MISC"]}, {"url": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html", "tags": ["x_refsource_MISC"]}, {"url": "http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html", "tags": ["x_refsource_MISC"]}, {"url": "http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html", "tags": ["x_refsource_MISC"]}], "workarounds": [{"lang": "en", "value": "Disable unprivileged user namespaces."}], "x_generator": {"engine": "Vulnogram 0.0.9"}, "descriptions": [{"lang": "en", "value": "The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges."}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "CWE", "cweId": "CWE-270", "description": "CWE-270: Privilege Context Switching Error"}]}], "providerMetadata": {"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical", "dateUpdated": "2021-12-03T19:06:06.000Z"}, "x_legacyV4Record": {"credit": [{"lang": "eng", "value": "An independent security researcher reporting to the SSD Secure Disclosure program"}], "impact": {"cvss": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, "source": {"discovery": "EXTERNAL"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_name": "5.8 kernel", "version_value": "5.8.0-50.56", "version_affected": "<"}, {"version_name": "5.4 kernel", "version_value": "5.4.0-72.80", "version_affected": "<"}, {"version_name": "4.15 kernel", "version_value": "4.15.0-142.146", "version_affected": "<"}, {"version_name": "4.4 kernel", "version_value": "4.4.0-209.241", "version_affected": "<"}]}, "product_name": "linux kernel"}]}, "vendor_name": "Ubuntu"}]}}, "solution": [{"lang": "en", "value": "Apply https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52"}], "data_type": "CVE", "generator": {"engine": "Vulnogram 0.0.9"}, "references": {"reference_data": [{"url": "https://ubuntu.com/security/notices/USN-4917-1", "name": "https://ubuntu.com/security/notices/USN-4917-1", "refsource": "MISC"}, {"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52", "refsource": "MISC"}, {"url": "https://www.openwall.com/lists/oss-security/2021/04/16/1", "name": "https://www.openwall.com/lists/oss-security/2021/04/16/1", "refsource": "MISC"}, {"url": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html", "name": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html", "refsource": "MISC"}, {"url": "http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html", "name": "http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html", "refsource": "MISC"}, {"url": "http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html", "name": "http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html", "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "eng", "value": "The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-270: Privilege Context Switching Error"}]}]}, "work_around": [{"lang": "en", "value": "Disable unprivileged user namespaces."}], "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2021-3493", "STATE": "PUBLIC", "ASSIGNER": "security@ubuntu.com", "DATE_PUBLIC": "2021-04-15T00:00:00.000Z"}}}}, "cveMetadata": {"cveId": "CVE-2021-3493", "state": "PUBLISHED", "dateUpdated": "2025-07-28T19:44:55.772Z", "dateReserved": "2021-04-12T00:00:00.000Z", "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "datePublished": "2021-04-17T04:20:16.706Z", "assignerShortName": "canonical"}, "dataVersion": "5.1"}