CVE-2018-7169
Summary
| CVE | CVE-2018-7169 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-02-15 20:29:00 UTC |
| Updated | 2019-10-03 00:03:00 UTC |
| Description | An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Shadow: security bypass (GLSA 201805-09) — Gentoo Security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| Bug #1729357 “unprivileged user can drop supplementary groups” : Bugs : shadow package : Ubuntu |
MISC |
bugs.launchpad.net |
Exploit, Issue Tracking, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 198646 Ubuntu Security Notification for shadow Vulnerabilities (USN-5254-1)
- 710271 Gentoo Linux Shadow security bypass Vulnerability (GLSA 201805-09)