Improper Privilege Management Affecting torvalds/linux package, versions [,v5.11-rc1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Mature
    EPSS
    0.83% (83rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UNMANAGED-TORVALDSLINUX-7644402
  • published 7 Aug 2024
  • disclosed 6 Aug 2024

How to fix?

Upgrade torvalds/linux to version v5.11-rc1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Privilege Management due to improper validation in the overlayfs implementation with respect to user namespaces. An attacker can gain elevated privileges by exploiting the setting of file capabilities on files in an underlying file system. This is only exploitable if the system has the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
7.1 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    High
  • Integrity (VI)
    Low
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None