The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Oct 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 07 Feb 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Wed, 14 Aug 2024 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: canonical
Published: 2021-04-17T04:20:16.706Z
Updated: 2025-10-21T23:25:48.908Z
Reserved: 2021-04-12T00:00:00.000Z
Link: CVE-2021-3493
Updated: 2024-08-03T16:53:17.827Z
Status : Modified
Published: 2021-04-17T05:15:14.630
Modified: 2025-10-22T00:17:44.043
Link: CVE-2021-3493