vulnerability

Ubuntu: (Multiple Advisories) (CVE-2018-18955): Linux kernel (AWS) vulnerabilities

Severity
7
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:C)
Published
2018-11-16
Added
2018-12-07
Modified
2025-01-28

Description

In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resources outside the namespace, as demonstrated by reading /etc/shadow. This occurs because an ID transformation takes place properly for the namespaced-to-kernel direction but not for the kernel-to-namespaced direction.

Solution(s)

ubuntu-upgrade-linux-image-4-15-0-1025-gcpubuntu-upgrade-linux-image-4-15-0-1027-kvmubuntu-upgrade-linux-image-4-15-0-1029-awsubuntu-upgrade-linux-image-4-15-0-1029-raspi2ubuntu-upgrade-linux-image-4-15-0-42-genericubuntu-upgrade-linux-image-4-15-0-42-generic-lpaeubuntu-upgrade-linux-image-4-15-0-42-lowlatencyubuntu-upgrade-linux-image-4-15-0-42-snapdragonubuntu-upgrade-linux-image-4-18-0-1004-gcpubuntu-upgrade-linux-image-4-18-0-1005-kvmubuntu-upgrade-linux-image-4-18-0-1006-awsubuntu-upgrade-linux-image-4-18-0-1007-raspi2ubuntu-upgrade-linux-image-4-18-0-12-genericubuntu-upgrade-linux-image-4-18-0-12-generic-lpaeubuntu-upgrade-linux-image-4-18-0-12-lowlatencyubuntu-upgrade-linux-image-4-18-0-12-snapdragonubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.