1 | 1 | | # CVE-2021-3493 |
2 | 2 | | Ubuntu OverlayFS Local Privesc |
3 | 3 | | |
| 4 | + | ## Affected Versions |
| 5 | + | |
| 6 | + | - Ubuntu 20.10 |
| 7 | + | - Ubuntu 20.04 LTS |
| 8 | + | - Ubuntu 18.04 LTS |
| 9 | + | - Ubuntu 16.04 LTS |
| 10 | + | - Ubuntu 14.04 ESM |
| 11 | + | |
| 12 | + | ## Description |
| 13 | + | |
| 14 | + | "Ubuntu specific issue in the overlayfs file system in the Linux kernel where it did not properly validate the application of file system capabilities with respect to user namespaces. A local attacker could use this to gain elevated privileges, due to a patch carried in Ubuntu to allow unprivileged overlayfs mounts." [- Ubuntu Security](https://ubuntu.com/security/CVE-2021-3493) |
| 15 | + | |
| 16 | + | Fixed in Linux 5.11 |
| 17 | + | |
| 18 | + | ## References |
| 19 | + | - https://ssd-disclosure.com/ssd-advisory-overlayfs-pe/ |
| 20 | + | - https://ubuntu.com/security/CVE-2021-3493 |
| 21 | + | - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 |
| 22 | + | - https://www.openwall.com/lists/oss-security/2021/04/16/1 |
| 23 | + | |
| 24 | + | ## Disclaimer |
| 25 | + | I am not the author of this exploit. I have not made any modifications to the PoC found here: https://ssd-disclosure.com/ssd-advisory-overlayfs-pe/. |
| 26 | + | |