No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-8212-1 | authd vulnerability |
Tue, 28 Apr 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical authd |
|
| Vendors & Products |
Canonical
Canonical authd |
Mon, 27 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | authd prior to version 0.6.4 contains a logic error in primary group ID assignment that can lead to local privilege escalation. When a user's primary group ID (GID) differs from their UID, either because the account was created with authd prior to version 0.5.4 or because the primary group was manually changed via the `authctl group set-gid` command, and the user's identity provider record is updated, authd incorrectly resets the user's primary group ID to their UID upon next login. This causes newly created files and directories to be owned by the wrong group, causing denial of service issues, and potentially granting unintended access to other local users and allowing local privilege escalation. | |
| Title | authd Denial of Service and Local Privilege Escalation | |
| Weaknesses | CWE-842 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-27T16:17:10.157Z
Reserved: 2026-04-24T16:52:35.090Z
Link: CVE-2026-6970
Updated: 2026-04-27T16:14:29.359Z
Status : Deferred
Published: 2026-04-27T16:16:46.300
Modified: 2026-04-27T18:35:53.583
Link: CVE-2026-6970
No data.
OpenCVE Enrichment
Updated: 2026-04-28T00:30:15Z
Ubuntu USN