First published: Mon Jun 06 2022(Updated: )
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|
If not needed, disable the ability for unprivileged users to create namespaces: $ sudo sysctl -w kernel.unprivileged_userns_clone=0 $ echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1966 is a duplicate candidate and users should reference CVE-2022-32250 instead.
If you come across CVE-2022-1966, please reference CVE-2022-32250 instead.
The impact of CVE-2022-1966 is the same as CVE-2022-32250, which should be referenced for more information.
More information about CVE-2022-32250 can be found at [CVE-2022-32250](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250).
Please refer to the mitigation steps provided for CVE-2022-32250 to address this vulnerability.