CISA KEV 정보
| 취약점명 | Linux Kernel Privilege Escalation Vulnerability |
|---|---|
| 설명 | The overlayfs stacking file system in Linux kernel does not properly validate the application of file capabilities against user namespaces, which could lead to privilege escalation. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-862 |
| 등록일 (KEV) | 2022-10-20 |
| 조치 기한 | 2022-11-10 |
| 추가 참고 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52; https://nvd.nist.gov/vuln/detail/CVE-2021-3493 |
NVD 상세 정보
CVSS v3.1: 8.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HCVSS v2.0: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C설명: The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
CWE: CWE-270 | CWE-863
참조
- http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html [Press/Media Coverage, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html [Exploit, Third Party Advisory, VDB Entry]
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 [Mailing List, Patch, Third Party Advisory]
- https://ubuntu.com/security/notices/USN-4917-1 [Vendor Advisory]
- https://www.openwall.com/lists/oss-security/2021/04/16/1 [Mailing List, Third Party Advisory]
- http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html [Press/Media Coverage, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html [Exploit, Third Party Advisory, VDB Entry]
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 [Mailing List, Patch, Third Party Advisory]
- https://ubuntu.com/security/notices/USN-4917-1 [Vendor Advisory]
- https://www.openwall.com/lists/oss-security/2021/04/16/1 [Mailing List, Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-3493 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.