Description
In shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, several locations which shift ids translate user/group ids before performing operations in the lower filesystem were translating them into init_user_ns, whereas they should have been translated into the s_user_ns for the lower filesystem. This resulted in using ids other than the intended ones in the lower fs, which likely did not map into the shifts s_user_ns. A local attacker could use this to possibly bypass discretionary access control permissions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-6716 | In shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, several locations which shift ids translate user/group ids before performing operations in the lower filesystem were translating them into init_user_ns, whereas they should have been translated into the s_user_ns for the lower filesystem. This resulted in using ids other than the intended ones in the lower fs, which likely did not map into the shifts s_user_ns. A local attacker could use this to possibly bypass discretionary access control permissions. |
Ubuntu USN |
USN-4183-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4184-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-16T16:58:57.384Z
Reserved: 2019-08-29T00:00:00.000Z
Link: CVE-2019-15793
No data.
Status : Modified
Published: 2020-04-24T00:15:11.840
Modified: 2024-11-21T04:29:28.743
Link: CVE-2019-15793
No data.
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN