CVE-2018-13405
06.07.2018, 14:29
The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 ≤ 3.16 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
redhat | mrg_realtime | 2.0 |
redhat | virtualization | 4.0 |
redhat | enterprise_linux_aus | 7.4 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_eus | 7.4 |
redhat | enterprise_linux_eus | 7.5 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 6.6 |
redhat | enterprise_linux_server_aus | 7.2 |
redhat | enterprise_linux_server_aus | 7.3 |
redhat | enterprise_linux_server_tus | 7.2 |
redhat | enterprise_linux_server_tus | 7.3 |
redhat | enterprise_linux_server_tus | 7.4 |
redhat | enterprise_linux_workstation | 6.0 |
redhat | enterprise_linux_workstation | 7.0 |
f5 | big-ip_access_policy_manager | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_access_policy_manager | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_access_policy_manager | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_access_policy_manager | 15.1.0 |
f5 | big-ip_access_policy_manager | 16.0.0 |
f5 | big-ip_advanced_firewall_manager | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_advanced_firewall_manager | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_advanced_firewall_manager | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_advanced_firewall_manager | 15.1.0 |
f5 | big-ip_advanced_firewall_manager | 16.0.0 |
f5 | big-ip_analytics | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_analytics | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_analytics | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_analytics | 15.1.0 |
f5 | big-ip_analytics | 16.0.0 |
f5 | big-ip_application_acceleration_manager | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_application_acceleration_manager | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_application_acceleration_manager | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_application_acceleration_manager | 15.1.0 |
f5 | big-ip_application_acceleration_manager | 16.0.0 |
f5 | big-ip_application_security_manager | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_application_security_manager | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_application_security_manager | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_application_security_manager | 15.1.0 |
f5 | big-ip_application_security_manager | 16.0.0 |
f5 | big-ip_domain_name_system | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_domain_name_system | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_domain_name_system | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_domain_name_system | 15.1.0 |
f5 | big-ip_domain_name_system | 16.0.0 |
f5 | big-ip_edge_gateway | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_edge_gateway | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_edge_gateway | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_edge_gateway | 15.1.0 |
f5 | big-ip_edge_gateway | 16.0.0 |
f5 | big-ip_fraud_protection_service | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_fraud_protection_service | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_fraud_protection_service | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_fraud_protection_service | 15.1.0 |
f5 | big-ip_fraud_protection_service | 16.0.0 |
f5 | big-ip_global_traffic_manager | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_global_traffic_manager | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_global_traffic_manager | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_global_traffic_manager | 15.1.0 |
f5 | big-ip_global_traffic_manager | 16.0.0 |
f5 | big-ip_link_controller | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_link_controller | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_link_controller | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_link_controller | 15.1.0 |
f5 | big-ip_link_controller | 16.0.0 |
f5 | big-ip_local_traffic_manager | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_local_traffic_manager | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_local_traffic_manager | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_local_traffic_manager | 15.1.0 |
f5 | big-ip_local_traffic_manager | 16.0.0 |
f5 | big-ip_policy_enforcement_manager | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_policy_enforcement_manager | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_policy_enforcement_manager | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_policy_enforcement_manager | 15.1.0 |
f5 | big-ip_policy_enforcement_manager | 16.0.0 |
f5 | big-ip_webaccelerator | 13.0.0 ≤ 𝑥 < 13.1.3.5 |
f5 | big-ip_webaccelerator | 14.0.0 ≤ 𝑥 < 14.1.3.1 |
f5 | big-ip_webaccelerator | 15.0.0 ≤ 𝑥 < 15.0.1.4 |
f5 | big-ip_webaccelerator | 15.1.0 |
f5 | big-ip_webaccelerator | 16.0.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
linux |
| ||||||||||
linux-aws |
| ||||||||||
linux-azure |
| ||||||||||
linux-azure-edge |
| ||||||||||
linux-euclid |
| ||||||||||
linux-flo |
| ||||||||||
linux-gcp |
| ||||||||||
linux-gke |
| ||||||||||
linux-goldfish |
| ||||||||||
linux-grouper |
| ||||||||||
linux-hwe |
| ||||||||||
linux-hwe-edge |
| ||||||||||
linux-kvm |
| ||||||||||
linux-lts-trusty |
| ||||||||||
linux-lts-utopic |
| ||||||||||
linux-lts-vivid |
| ||||||||||
linux-lts-wily |
| ||||||||||
linux-lts-xenial |
| ||||||||||
linux-maguro |
| ||||||||||
linux-mako |
| ||||||||||
linux-manta |
| ||||||||||
linux-oem |
| ||||||||||
linux-raspi2 |
| ||||||||||
linux-snapdragon |
|
Common Weakness Enumeration
References