First published: Tue Nov 12 2019(Updated: )
In shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, several locations which shift ids translate user/group ids before performing operations in the lower filesystem were translating them into init_user_ns, whereas they should have been translated into the s_user_ns for the lower filesystem. This resulted in using ids other than the intended ones in the lower fs, which likely did not map into the shifts s_user_ns. A local attacker could use this to possibly bypass discretionary access control permissions.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =5.0 | |
Linux Kernel | =5.3 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-15793.
The affected software for this vulnerability includes the Ubuntu 5.0 and 5.3 kernel series.
The severity of CVE-2019-15793 is not specified.
To fix CVE-2019-15793, it is recommended to update to the latest version of the Ubuntu kernel series affected by this vulnerability.
You can find more information about CVE-2019-15793 in the references provided: [reference](https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=3644b9d5688da86f18e017c9c580b75cf52927bb) [reference](https://usn.ubuntu.com/usn/usn-4183-1) [reference](https://usn.ubuntu.com/usn/usn-4184-1)