First published: Thu Jan 13 2022(Updated: )
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.12.2.rt7.143.el8_5 | 0:4.18.0-348.12.2.rt7.143.el8_5 |
redhat/kernel | <0:4.18.0-348.12.2.el8_5 | 0:4.18.0-348.12.2.el8_5 |
redhat/kernel-rt | <0:4.18.0-305.34.2.rt7.107.el8_4 | 0:4.18.0-305.34.2.rt7.107.el8_4 |
redhat/kernel | <0:4.18.0-305.34.2.el8_4 | 0:4.18.0-305.34.2.el8_4 |
Linux Linux kernel | >=5.1<5.4.173 | |
Linux Linux kernel | >=5.5<5.10.93 | |
Linux Linux kernel | >=5.11<5.15.16 | |
Linux Linux kernel | >=5.16<5.16.2 | |
Netapp H410c Firmware | ||
Netapp H410c | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
Netapp H300e Firmware | ||
Netapp H300e | ||
Netapp H500e Firmware | ||
Netapp H500e | ||
Netapp H700e Firmware | ||
Netapp H700e | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
IBM Planning Analytics Cartridge for IBM Cloud Pak for Data | <=4.0 | |
All of | ||
Netapp H410c Firmware | ||
Netapp H410c | ||
All of | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
All of | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
All of | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
All of | ||
Netapp H300e Firmware | ||
Netapp H300e | ||
All of | ||
Netapp H500e Firmware | ||
Netapp H500e | ||
All of | ||
Netapp H700e Firmware | ||
Netapp H700e | ||
All of | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
Linux kernel | ||
debian/linux | 5.10.223-1 6.1.106-3 6.1.99-1 6.10.9-1 |
On non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0: # echo "user.max_user_namespaces=0" > /etc/sysctl.d/userns.conf # sysctl -p /etc/sysctl.d/userns.conf On containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
Disable unprivileged user namespaces: sysctl -w kernel.unprivileged_userns_clone=0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)