First published: Mon May 08 2023(Updated: )
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 | |
redhat/kernel | <6.4 | 6.4 |
Linux Linux kernel | >=3.13<4.14.315 | |
Linux Linux kernel | >=4.15<4.19.283 | |
Linux Linux kernel | >=4.20<5.4.243 | |
Linux Linux kernel | >=5.5<5.10.180 | |
Linux Linux kernel | >=5.11<5.15.111 | |
Linux Linux kernel | >=5.16<6.1.28 | |
Linux Linux kernel | >=6.2<6.2.15 | |
Linux Linux kernel | >=6.3<6.3.2 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Netapp Hci Baseboard Management Controller | =h300s | |
Netapp Hci Baseboard Management Controller | =h410c | |
Netapp Hci Baseboard Management Controller | =h410s | |
Netapp Hci Baseboard Management Controller | =h500s | |
Netapp Hci Baseboard Management Controller | =h700s | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.9-1 6.12.10-1 |
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.