Overview
- Description
- The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
- Source
- security@ubuntu.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Known exploits
Data from CISA
- Vulnerability name
- Linux Kernel Privilege Escalation Vulnerability
- Exploit added on
- Oct 20, 2022
- Exploit action due
- Nov 10, 2022
- Required action
- Apply updates per vendor instructions.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "90A80DE7-3EFA-464C-9D31-C46521FFBFBF", "versionEndExcluding": "18.04" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "2027773B-26DA-408E-B71D-40D05690D9EA", "versionEndExcluding": "20.04", "versionStartIncluding": "18.04.1" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "ACAB2EE0-EC21-4669-840F-94F6C3028C64", "versionEndExcluding": "20.10" } ], "operator": "OR" } ] } ]