Home

Description

authd prior to version 0.6.4 contains a logic error in primary group ID assignment that can lead to local privilege escalation. When a user's primary group ID (GID) differs from their UID, either because the account was created with authd prior to version 0.5.4 or because the primary group was manually changed via the `authctl group set-gid` command, and the user's identity provider record is updated, authd incorrectly resets the user's primary group ID to their UID upon next login. This causes newly created files and directories to be owned by the wrong group, causing denial of service issues, and potentially granting unintended access to other local users and allowing local privilege escalation.

PUBLISHED Reserved 2026-04-24 | Published 2026-04-27 | Updated 2026-04-27 | Assigner canonical




HIGH: 7.3CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-842 Placement of user into incorrect group

Product status

Default status
unaffected

0.6.0 (semver) before 0.6.4
affected

0.6.1 (ubuntu-resolute) before 0.6.1ubuntu0.1
affected

References

github.com/.../authd/security/advisories/GHSA-fg3j-5w9g-hmg7 vendor-advisory

github.com/...ommit/154b428305cb1a7a19c897626fefd09d6dde8b9f patch

cve.org (CVE-2026-6970)

nvd.nist.gov (CVE-2026-6970)

Download JSON