[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2018-18955Date: (C)2019-05-30   (M)2024-02-22


In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resources outside the namespace, as demonstrated by reading /etc/shadow. This occurs because an ID transformation takes place properly for the namespaced-to-kernel direction but not for the kernel-to-namespaced direction.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.0CVSS Score : 4.4
Exploit Score: 1.0Exploit Score: 3.4
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
BID-105941
EXPLOIT-DB-45886
EXPLOIT-DB-45915
USN-3832-1
USN-3833-1
USN-3835-1
USN-3836-1
USN-3836-2
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd
https://bugs.chromium.org/p/project-zero/issues/detail?id=1712
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.19
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2
https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd
https://security.netapp.com/advisory/ntap-20190416-0003/
https://support.f5.com/csp/article/K39103040

CPE    3
cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~
cpe:/o:linux:linux_kernel
cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~
CWE    1
CWE-863
OVAL    8
oval:org.secpod.oval:def:49782
oval:org.secpod.oval:def:704465
oval:org.secpod.oval:def:53010
oval:org.secpod.oval:def:51175
...

© SecPod Technologies