Kwetsbaarheid CVE-2018-18955

In The Linux Kernel 4.15.x Through 4.19.x Before 4.19.2, Map_write() In Kernel/user_namespace.c Allows Privilege Escalation Because It Mishandles Nested User Namespaces With More Than 5 UID Or GID Ranges. A User Who Has CAP_SYS_ADMIN In An Affected User Namespace Can Bypass Access Controls On Resources Outside The Namespace, As Demonstrated By Reading /etc/shadow. This Occurs Because An ID Transformation Takes Place Properly For The Namespaced-to-kernel Direction But Not For The Kernel-to-namespaced Direction.

Algemeen

CVE
CVE-2018-18955
Leverancier(s) betrokken
Omschrijving
In The Linux Kernel 4.15.x Through 4.19.x Before 4.19.2, Map_write() In Kernel/user_namespace.c Allows Privilege Escalation Because It Mishandles Nested User Namespaces With More Than 5 UID Or GID Ranges. A User Who Has CAP_SYS_ADMIN In An Affected User Namespace Can Bypass Access Controls On Resources Outside The Namespace, As Demonstrated By Reading /etc/shadow. This Occurs Because An ID Transformation Takes Place Properly For The Namespaced-to-kernel Direction But Not For The Kernel-to-namespaced Direction.
Publicatie
Vrijdag, 16 November 2018
Gewijzigd
Dinsdag, 4 December 2018 15:00
Ernst

Referenties

Modificatie geschiedenis

Geef hieronder je email adres op en word op de hoogte gehouden van aanpassingen aan deze CVE