First published: Tue Feb 22 2022(Updated: )
An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in netfilter subcomponent in the Linux kernel due to a heap out of bounds write problem. In this flaw, an attacker with a user account on the system to gain access to out-of-bounds memory leads to a system crash or a privilege escalation threat. Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6">https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6</a> <a href="https://www.openwall.com/lists/oss-security/2022/02/21/2">https://www.openwall.com/lists/oss-security/2022/02/21/2</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.23.1.rt7.153.el8_5 | 0:4.18.0-348.23.1.rt7.153.el8_5 |
redhat/kernel | <0:4.18.0-348.23.1.el8_5 | 0:4.18.0-348.23.1.el8_5 |
redhat/kernel-rt | <0:4.18.0-305.45.1.rt7.117.el8_4 | 0:4.18.0-305.45.1.rt7.117.el8_4 |
redhat/kernel | <0:4.18.0-305.45.1.el8_4 | 0:4.18.0-305.45.1.el8_4 |
Linux Linux kernel | >=5.4<5.4.182 | |
Linux Linux kernel | >=5.5<5.10.103 | |
Linux Linux kernel | >=5.11<5.15.26 | |
Linux Linux kernel | >=5.16<5.16.12 | |
Debian Debian Linux | =11.0 | |
Netapp Baseboard Management Controller H300e | ||
Netapp Baseboard Management Controller H300s | ||
Netapp Baseboard Management Controller H410c | ||
Netapp Baseboard Management Controller H410s | ||
Netapp Baseboard Management Controller H500e | ||
Netapp Baseboard Management Controller H500s | ||
Netapp Baseboard Management Controller H700e | ||
Netapp Baseboard Management Controller H700s | ||
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Network Exposure Function | =22.1.1 | |
Oracle Communications Cloud Native Core Policy | =22.2.0 | |
Netapp H300e | ||
Netapp H300s | ||
Netapp H410c | ||
Netapp H410s | ||
Netapp H500e | ||
Netapp H500s | ||
Netapp H700e | ||
Netapp H700s | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.5-1 6.12.6-1 |
The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command: echo 0 > /proc/sys/user/max_user_namespaces For making this change in configuration permanent. Note: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable. Configure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the "/etc/sysctl.d/" directory: user.max_user_namespaces = 0 The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system The other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit
Disable unprivileged user namespaces to restrict access to privileged users (have CAP_NET_ADMIN) via the kernel.unprivileged_userns_clone sysctl: $ sudo sysctl kernel.unprivileged_userns_clone=0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)