First published: Fri Jan 13 2023(Updated: )
A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=5.5.0<5.10.164 | |
Linux Linux kernel | >=5.11<5.15.89 | |
Linux Linux kernel | >=5.16<6.1.7 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Canonical Ubuntu Linux | =22.04 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =9.0 | |
Redhat Enterprise Linux For Ibm Z Systems | =9.0 | |
Redhat Enterprise Linux For Power Little Endian | =9.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =9.0 | |
Redhat Enterprise Linux For Real Time | =9.0 | |
Redhat Enterprise Linux For Real Time For Nfv | =9.0 | |
Redhat Enterprise Linux Server | =9.0 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =9.0 | |
Redhat Codeready Linux Builder | ||
Redhat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =9.0 | |
Redhat Enterprise Linux For Ibm Z Systems | =9.0 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =9.0 | |
Redhat Enterprise Linux For Power Little Endian | =9.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =9.0 | |
Redhat Enterprise Linux Server | =9.0 | |
redhat/kernel | <0:5.14.0-162.18.1.el9_1 | 0:5.14.0-162.18.1.el9_1 |
redhat/kernel-rt | <0:5.14.0-162.18.1.rt21.181.el9_1 | 0:5.14.0-162.18.1.rt21.181.el9_1 |
redhat/kernel | <0:5.14.0-70.49.1.el9_0 | 0:5.14.0-70.49.1.el9_0 |
redhat/kernel-rt | <0:5.14.0-70.49.1.rt21.120.el9_0 | 0:5.14.0-70.49.1.rt21.120.el9_0 |
redhat/kernel | <5.10.164 | 5.10.164 |
redhat/kernel | <5.15.89 | 5.15.89 |
redhat/kernel | <6.1.7 | 6.1.7 |
All of | ||
Redhat Codeready Linux Builder | ||
Any of | ||
Redhat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =9.0 | |
Redhat Enterprise Linux For Ibm Z Systems | =9.0 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =9.0 | |
Redhat Enterprise Linux For Power Little Endian | =9.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =9.0 | |
Redhat Enterprise Linux Server | =9.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.5-1 6.12.6-1 |
This flaw can be mitigated by disabling unprivileged user namespaces will prevent exploitation: ~~~ sysctl -w kernel.unprivileged_userns_clone = 0 ~~~
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)