First published: Mon May 08 2023(Updated: )
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.13<4.14.315 | |
Linux Linux kernel | >=4.15<4.19.283 | |
Linux Linux kernel | >=4.20<5.4.243 | |
Linux Linux kernel | >=5.5<5.10.180 | |
Linux Linux kernel | >=5.11<5.15.111 | |
Linux Linux kernel | >=5.16<6.1.28 | |
Linux Linux kernel | >=6.2<6.2.15 | |
Linux Linux kernel | >=6.3<6.3.2 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Netapp Hci Baseboard Management Controller | =h300s | |
Netapp Hci Baseboard Management Controller | =h410c | |
Netapp Hci Baseboard Management Controller | =h410s | |
Netapp Hci Baseboard Management Controller | =h500s | |
Netapp Hci Baseboard Management Controller | =h700s | |
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 | |
redhat/kernel | <6.4 | 6.4 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.5-1 6.11.7-1 |
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.