First published: Wed Jul 05 2023(Updated: )
Last updated 24 March 2025
Credit: security@ubuntu.com security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 | |
Red Hat Kernel-devel | ||
Linux Kernel | >=3.13<4.14.322 | |
Linux Kernel | >=4.15<=4.19.291 | |
Linux Kernel | >=4.20<5.4.251 | |
Linux Kernel | >=5.5<5.10.188 | |
Linux Kernel | >=5.11<5.15.121 | |
Linux Kernel | >=5.16<6.1.39 | |
Linux Kernel | >=6.2<6.4.4 | |
Debian Linux | =11.0 | |
Red Hat Fedora | =37 | |
Red Hat Fedora | =38 | |
NetApp H300S Firmware | ||
NetApp H410C Firmware | ||
NetApp H410S Firmware | ||
NetApp H500e Firmware | ||
NetApp H700S | ||
Linux Kernel | =3.13-rc1 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.19-1 6.12.20-1 |
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35001 is considered a high-severity vulnerability that allows local authenticated attackers to gain elevated privileges.
To fix CVE-2023-35001, update to the latest kernel versions or apply available patches from your Linux distribution.
CVE-2023-35001 affects various versions of the Linux Kernel, including those from 3.13 up to 6.4.4, as well as specific products like IBM QRadar Network Packet Capture.
No, CVE-2023-35001 requires local authenticated access, which limits the potential for remote exploitation.
If your system is vulnerable to CVE-2023-35001, prioritize updating your kernel and monitoring for unusual behavior on your system.