{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T11:33:15.521","vulnerabilities":[{"cve":{"id":"CVE-2021-3493","sourceIdentifier":"security@ubuntu.com","published":"2021-04-17T05:15:14.630","lastModified":"2025-10-28T13:49:50.883","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges."},{"lang":"es","value":"La implementación de overlayfs en el kernel de Linux no comprobó apropiadamente con respecto a los espacios de nombre de los usuarios, la configuración de las capacidades de los archivos en un sistema de archivos subyacente.&#xa0;Debido a la combinación de los espacios de nombre de usuarios no privilegiados junto con un parche incluido en el kernel de Ubuntu para permitir montajes de superposición no privilegiados, un atacante podría usar esto para alcanzar privilegios elevados"}],"metrics":{"cvssMetricV31":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:C\/C:H\/I:H\/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.0,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L\/AC:L\/Au:N\/C:C\/I:C\/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"cisaExploitAdd":"2022-10-20","cisaActionDue":"2022-11-10","cisaRequiredAction":"Apply updates per vendor instructions.","cisaVulnerabilityName":"Linux Kernel Privilege Escalation Vulnerability","weaknesses":[{"source":"security@ubuntu.com","type":"Secondary","description":[{"lang":"en","value":"CWE-270"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*","versionEndExcluding":"18.04","matchCriteriaId":"90A80DE7-3EFA-464C-9D31-C46521FFBFBF"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*","versionStartIncluding":"18.04.1","versionEndExcluding":"20.04","matchCriteriaId":"2027773B-26DA-408E-B71D-40D05690D9EA"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:-:*:*:*","versionEndExcluding":"20.10","matchCriteriaId":"ACAB2EE0-EC21-4669-840F-94F6C3028C64"}]}]}],"references":[{"url":"http:\/\/packetstormsecurity.com\/files\/162434\/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html","source":"security@ubuntu.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http:\/\/packetstormsecurity.com\/files\/162866\/Ubuntu-OverlayFS-Local-Privilege-Escalation.html","source":"security@ubuntu.com","tags":["Press/Media Coverage","Third Party Advisory","VDB Entry"]},{"url":"http:\/\/packetstormsecurity.com\/files\/165151\/Ubuntu-Overlayfs-Local-Privilege-Escalation.html","source":"security@ubuntu.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52","source":"security@ubuntu.com","tags":["Mailing List","Patch","Third Party Advisory"]},{"url":"https:\/\/ubuntu.com\/security\/notices\/USN-4917-1","source":"security@ubuntu.com","tags":["Vendor Advisory"]},{"url":"https:\/\/www.openwall.com\/lists\/oss-security\/2021\/04\/16\/1","source":"security@ubuntu.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/packetstormsecurity.com\/files\/162434\/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http:\/\/packetstormsecurity.com\/files\/162866\/Ubuntu-OverlayFS-Local-Privilege-Escalation.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Press/Media Coverage","Third Party Advisory","VDB Entry"]},{"url":"http:\/\/packetstormsecurity.com\/files\/165151\/Ubuntu-Overlayfs-Local-Privilege-Escalation.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Third Party Advisory"]},{"url":"https:\/\/ubuntu.com\/security\/notices\/USN-4917-1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https:\/\/www.openwall.com\/lists\/oss-security\/2021\/04\/16\/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-3493","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}]}}]}