Contact Info

Atlas Cloud LLC 600 Cleveland Street Suite 348 Clearwater, FL 33755 USA

support@dedirock.com

Client Area
Recommended Services
Supported Scripts
WordPress
Hubspot
Joomla
Drupal
Wix
Shopify
Magento
Typeo3

Linux administrators using Ubuntu are being urged to address three newly discovered vulnerabilities that undermine the unprivileged user namespace restriction feature. Initially implemented to enhance security, these vulnerabilities allow a malicious actor to bypass protections under specific conditions.

Robert Beggs, a cybersecurity expert and CEO of DigitalDefence, emphasized the urgency of mitigating these vulnerabilities, noting that while they may not seem severe alone, they could be exploited in conjunction with other vulnerabilities, leading to significant security breaches.

Though no active exploits have been reported, Johannes Ullrich from the SANS Institute downplayed the threat, suggesting that the vulnerabilities do not allow access to any privileges beyond what users would have without namespaces. However, for administrators who rely on namespaces for security, this lapse may pose a risk.

The issues stem from the recent AppArmor-based features introduced in Ubuntu aimed at reducing the attack surface from unprivileged user namespaces. Researchers from Qualys identified three methods through which the unprivileged user namespace protection could be circumvented, enabling local attackers to create user namespaces with full administrative capabilities.

The three bypass techniques include:

  1. Utilizing the aa-exec tool, which allows transitioning to an AppArmor profile that permits user namespace creation.
  2. Executing a busybox shell that grants similar permissions.
  3. Injecting a shell into an application through LD_PRELOAD that allows the creation of user namespaces.

Ubuntu maintains that these are not true security vulnerabilities, arguing that the inherent restrictions of user namespaces still limit access to the permissions of the real user. They assure users that they are working on enhancements to address these limitations.

To mitigate the risks, security experts recommend that system administrators ensure their installations are fully up-to-date and make specific changes to the kernel settings to limit unprivileged profile changes. They should also consider adjusting AppArmor profiles that currently allow for the creation of user namespaces with elevated privileges.


Welcome to DediRock, your trusted partner in high-performance hosting solutions. At DediRock, we specialize in providing dedicated servers, VPS hosting, and cloud services tailored to meet the unique needs of businesses and individuals alike. Our mission is to deliver reliable, scalable, and secure hosting solutions that empower our clients to achieve their digital goals. With a commitment to exceptional customer support, cutting-edge technology, and robust infrastructure, DediRock stands out as a leader in the hosting industry. Join us and experience the difference that dedicated service and unwavering reliability can make for your online presence. Launch our website.

Share this Post
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x