{"id":"CVE-2018-7169","details":"An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used \"group blacklisting\" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.","modified":"2026-04-16T06:18:01.077645087Z","published":"2018-02-15T20:29:00.867Z","related":["SUSE-SU-2018:0662-1","openSUSE-SU-2024:11378-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201805-09"},{"type":"REPORT","url":"https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/shadow-maint/shadow","events":[{"introduced":"0"},{"last_affected":"15be89f89d553c06d52453721ee8e9a8433cfdfd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.5"}]}}],"versions":["4.2.1","4.3.0","4.3.1","4.4","4.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-7169.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}