vulnerability
Ubuntu: (Multiple Advisories) (CVE-2018-13405): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | 2018-07-06 | 2018-08-31 | 2025-01-23 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
2018-07-06
Added
2018-08-31
Modified
2025-01-23
Description
The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.
Solution(s)
ubuntu-upgrade-linux-image-3-13-0-157-genericubuntu-upgrade-linux-image-3-13-0-157-generic-lpaeubuntu-upgrade-linux-image-3-13-0-157-lowlatencyubuntu-upgrade-linux-image-3-13-0-157-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-157-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-157-powerpc-smpubuntu-upgrade-linux-image-3-13-0-157-powerpc64-embubuntu-upgrade-linux-image-3-13-0-157-powerpc64-smpubuntu-upgrade-linux-image-4-15-0-1017-oemubuntu-upgrade-linux-image-4-15-0-1018-gcpubuntu-upgrade-linux-image-4-15-0-1020-awsubuntu-upgrade-linux-image-4-15-0-1020-kvmubuntu-upgrade-linux-image-4-15-0-1021-raspi2ubuntu-upgrade-linux-image-4-15-0-1022-azureubuntu-upgrade-linux-image-4-15-0-33-genericubuntu-upgrade-linux-image-4-15-0-33-generic-lpaeubuntu-upgrade-linux-image-4-15-0-33-lowlatencyubuntu-upgrade-linux-image-4-15-0-33-snapdragonubuntu-upgrade-linux-image-4-4-0-1028-awsubuntu-upgrade-linux-image-4-4-0-1032-kvmubuntu-upgrade-linux-image-4-4-0-1066-awsubuntu-upgrade-linux-image-4-4-0-1095-raspi2ubuntu-upgrade-linux-image-4-4-0-1099-snapdragonubuntu-upgrade-linux-image-4-4-0-134-genericubuntu-upgrade-linux-image-4-4-0-134-generic-lpaeubuntu-upgrade-linux-image-4-4-0-134-lowlatencyubuntu-upgrade-linux-image-4-4-0-134-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-134-powerpc-smpubuntu-upgrade-linux-image-4-4-0-134-powerpc64-embubuntu-upgrade-linux-image-4-4-0-134-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-edgeubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon
References
- CVE-2018-13405
- https://attackerkb.com/topics/CVE-2018-13405
- DEBIAN-DSA-4266
- NVD-CVE-2018-13405
- UBUNTU-USN-3676-1
- UBUNTU-USN-3676-2
- UBUNTU-USN-3696-1
- UBUNTU-USN-3696-2
- UBUNTU-USN-3752-1
- UBUNTU-USN-3752-2
- UBUNTU-USN-3752-3
- UBUNTU-USN-3753-1
- UBUNTU-USN-3753-2
- UBUNTU-USN-3754-1
- UBUNTU-USN-3910-1
- UBUNTU-USN-3910-2
- UBUNTU-USN-4486-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.