The Qualys Threat Research Unit (TRU) identified 3 security bypasses in Ubuntu’s unprivileged user namespace restrictions. These vulnerabilities, discovered in Jan 2025, allow local attackers to create user namespaces with administrative privileges. Specifically, these vulnerabilities exploit weaknesses in the kernel components responsible for managing namespaces, creating avenues for unauthorized users to gain elevated permissions that are typically restricted. While these bypasses do not immediately lead to full system takeover, they become dangerous when combined with other kernel-related vulnerabilities.
The security bypasses discovered by Qualys TRU are related to the user namespace restrictions in Ubuntu, which are designed to prevent unprivileged users from acquiring full administrative rights within Linux namespaces. These restrictions were introduced in Ubuntu 23.10 but only enabled by default in Ubuntu 24.04. Despite these efforts, the Qualys TRU researchers identified three distinct methods through which attackers could bypass these protections.
AFFECTED VERSIONS: Ubuntu versions 24.04 and later, as well as version 23.10
The three bypasses in question involve:
SOURCES:
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy