Ubuntu’s New Unprivileged User Namespace Feature Comes With New Vulnerabilities

Source: Bleeping Computer Ubuntu’s New Unprivileged User Namespace Feature Comes With New Vulnerabilities

Unprivileged Does Not Generally Imply Full Administrative Rights

Those running Ubuntu 23.10 and newer need to make some changes to their system configuration to deal with serious issues with the new unprivileged user namespaces feature.  These namespaces should create an isolated sandbox where a user can be granted any permissions, such as root, which they might need inside that container but without granting them escalated privileges outside of that namespace.  That would be a great feature, if it worked as intended.  Unfortunately the default settings offer three different ways to create a new unprivileged user namespace with full root privileges for the entire system.

The three methods include bypassing aa-exec, busybox, or LD_PRELOAD to create a new namespace with full root access which can be leverage to impact parts of the system supposedly walled off from these unprivileged user namespaces.  Thankfully there are ways to mitigate all three vulnerabilities while still maintaining the ability to use this new feature.  Bleeping Computer published the four steps you should take here, so head over and make sure to apply them.

Linux user namespaces allow users to act as root inside an isolated sandbox (namespace) without having the same privileges on the host.

Video News

About The Author

Jeremy Hellstrom

Call it K7M.com, AMDMB.com, or PC Perspective, Jeremy has been hanging out and then working with the gang here for years. Apart from the front page you might find him on the BOINC Forums or possibly the Fraggin' Frogs if he has the time.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Podcasts

Archive & Timeline

Previous 12 months
Explore: All The Years!