CVE-2026-6970
Logic Error in authd Group ID Assignment Enables Privilege Escalation
Publication date: 2026-04-27
Last updated on: 2026-04-27
Assigner: Canonical Ltd.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| canonical | authd | to 0.6.4 (exc) |
| canonical | authd | From 0.5.4 (inc) to 0.6.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-842 | The product or the administrator places a user into an incorrect group. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in authd prior to version 0.6.4 can lead to local privilege escalation by incorrectly resetting a user's primary group ID to their user ID. This misconfiguration can cause files and directories to be owned by the wrong group, potentially granting unauthorized local users access to sensitive data.
Such unauthorized access and privilege escalation can impact the confidentiality, integrity, and availability of data, which are core principles in compliance frameworks like GDPR and HIPAA.
Therefore, if exploited, this vulnerability could lead to violations of data protection requirements under these regulations by exposing sensitive information to unauthorized users or disrupting service availability.
Can you explain this vulnerability to me?
CVE-2026-6970 is a high-severity vulnerability in the authd package versions 0.6.0 through before 0.6.4 caused by a logic error in the assignment of a user's primary group ID (GID). When a user's primary GID differs from their user ID (UID), either because the account was created with authd prior to version 0.5.4 or because the primary group was manually changed using the authctl utility, authd incorrectly resets the primary GID to the UID upon the user's next login if their identity provider record is updated.
This incorrect resetting causes newly created files and directories to be owned by the wrong group, which can lead to denial of service issues and potentially grant unintended access to other local users. This misconfiguration enables local privilege escalation by allowing attackers with low privileges to gain higher access through the incorrect group ownership.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing a local attacker with low privileges to escalate their privileges on the affected system. Because the primary group ID is incorrectly reset to the user's UID, files and directories created by the user may be owned by the wrong group.
This misownership can cause denial of service issues and potentially grant unauthorized local users access to sensitive files, compromising confidentiality, integrity, and availability of data on the system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by enumerating all authd users and comparing their current primary group ID (GID) with the correct GID from the group database. If there is a mismatch, it indicates the presence of the vulnerability.
A provided shell script (mentioned in the advisory) automates this process by checking each user's GID and resetting it if necessary.
Commands that can be used include:
- `authctl group set-gid` - to manually set the correct GID for a user.
- `getent passwd` and `getent group` - to inspect user and group records and verify if the primary GID matches expected values.
- `loginctl terminate-user <username>` - to terminate active sessions after remediation.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability immediately, upgrade authd to version 0.6.4 or later where the issue is fixed.
If upgrading is not immediately possible, run the provided shell script to:
- Enumerate all authd users and compare their current GID with the correct GID from the group database.
- Reset the GID using `authctl group set-gid` for users with mismatched GIDs.
- Recursively change file ownership in the user's home directory to the correct group.
After applying these changes, users must log out and log back in for the changes to take effect. Optionally, active sessions can be terminated using `loginctl terminate-user`.
Note that files outside home directories may require manual ownership correction.