First published: Thu Feb 15 2018(Updated: )
An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Shadow Project | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7169 has a medium severity rating due to its potential to grant unauthorized access to filesystem paths.
To fix CVE-2018-7169, update the shadow package to version 4.5 or later, which addresses the vulnerability.
CVE-2018-7169 affects systems running the shadow package version 4.5.
The impact of CVE-2018-7169 allows an unprivileged user to remove themselves from a supplementary group, potentially leading to unauthorized access.
CVE-2018-7169 can be exploited by users with minimal privileges, making it a relatively low-barrier attack.