CVE-2021-3493

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
References
Link Resource
http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 Mailing List Patch Third Party Advisory
https://ubuntu.com/security/notices/USN-4917-1 Vendor Advisory
https://www.openwall.com/lists/oss-security/2021/04/16/1 Mailing List Third Party Advisory
http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 Mailing List Patch Third Party Advisory
https://ubuntu.com/security/notices/USN-4917-1 Vendor Advisory
https://www.openwall.com/lists/oss-security/2021/04/16/1 Mailing List Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-3493
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:-:*:*:*

History

22 Oct 2025, 00:17

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-3493 -

21 Oct 2025, 20:18

Type Values Removed Values Added
References
  • {'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-3493', 'source': '134c704f-9b21-4f2e-91b3-4a467353bcc0'}

21 Oct 2025, 19:19

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-3493 -

Information

Published : 2021-04-17 05:15

Updated : 2025-10-22 00:17


NVD link : CVE-2021-3493

Mitre link : CVE-2021-3493

CVE.ORG link : CVE-2021-3493


JSON object : View

Products Affected

canonical

  • ubuntu_linux
CWE
CWE-270

Privilege Context Switching Error

CWE-863

Incorrect Authorization