In shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, several locations which shift ids translate user/group ids before performing operations in the lower filesystem were translating them into init_user_ns, whereas they should have been translated into the s_user_ns for the lower filesystem. This resulted in using ids other than the intended ones in the lower fs, which likely did not map into the shifts s_user_ns. A local attacker could use this to possibly bypass discretionary access control permissions.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Linux Kernel Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-6716 In shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, several locations which shift ids translate user/group ids before performing operations in the lower filesystem were translating them into init_user_ns, whereas they should have been translated into the s_user_ns for the lower filesystem. This resulted in using ids other than the intended ones in the lower fs, which likely did not map into the shifts s_user_ns. A local attacker could use this to possibly bypass discretionary access control permissions.
Ubuntu USN Ubuntu USN USN-4183-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4184-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-09-16T16:58:57.384Z

Reserved: 2019-08-29T00:00:00

Link: CVE-2019-15793

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-24T00:15:11.840

Modified: 2024-11-21T04:29:28.743

Link: CVE-2019-15793

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses