SB2018112006 - Privilege escalation in Linux Kernel



SB2018112006 - Privilege escalation in Linux Kernel

Published: November 20, 2018 Updated: May 23, 2022

Security Bulletin ID SB2018112006
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Privilege escalation (CVE-ID: CVE-2018-18955)

The vulnerability allows a local attacker to gain elevated privileges on a targeted system.

The weakness exists due to the map_write() function, as defined in the kernel/user_namespace.c source code file, improperly handles nested user namespaces that have more than five user identifier (UID) or group identifier (GID) ranges. A local attacker with CAP_SYS_ADMIN capabilities in a targeted user namespace can access the system and execute an application that submits malicious input to bypass access controls outside the user namespace and gain elevated privileges on the system.


Remediation

Install update from vendor's website.