CVE-2021-3493

Known Exploited Public Exploit

Description

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

Remediation

Solution:

  • Apply https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52

Workaround:

  • Disable unprivileged user namespaces.

Categories

8.8
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 66.83% Top 5%
KEV Since 
Vendor Advisory ubuntu.com
Affected: Ubuntu linux kernel
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-3493?
CVE-2021-3493 has been scored as a high severity vulnerability.
How to fix CVE-2021-3493?
To fix CVE-2021-3493: Apply https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52
Is CVE-2021-3493 being actively exploited in the wild?
It is confirmed that CVE-2021-3493 is actively exploited. Be extra cautious if you are using vulnerable components. According to its EPSS score, there is a ~67% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-3493?
CVE-2021-3493 affects Ubuntu linux kernel.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.