First published: Sat Apr 17 2021(Updated: )
Last updated 18 February 2025
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | <18.04 | |
Ubuntu | >=18.04.1<20.04 | |
Ubuntu | <20.10 | |
Red Hat Kernel-devel | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
Apply https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3493 has a high severity rating due to the potential for local privilege escalation through improper validation of file capabilities.
To fix CVE-2021-3493, upgrade the Linux kernel to versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.11-1, or 6.12.12-1.
CVE-2021-3493 affects Ubuntu versions ranging from 18.04 to 20.10, including specific LTS releases.
No, CVE-2021-3493 is a local vulnerability that requires local access to exploit rather than being network-related.
CVE-2021-3493 affects the overlayfs implementation within the Linux kernel.