Описание
A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.
A flaw was found in the Linux kernel. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Отчет
Only local users with CAP_NET_RAW capability enabled can trigger this issue. For OpenShift Container Platform 4, pods in the default restricted SCC are granted CAP_NET_RAW by default. An attacker can exploit this if they can run arbitrary container images on the target cluster.
Меры по смягчению последствий
If the CAP_NET_RAW capability disabled by default (which is true for Red Hat Enterprise Linux), then only a privileged user can trigger this bug. The mitigation is to disable CAP_NET_RAW capability for regular users and for executables. On Red Hat Enterprise Linux 8 CAP_NET_RAW capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:
echo "user.max_user_namespaces=0" > /etc/sysctl.d/userns.conf
sysctl -p /etc/sysctl.d/userns.conf
OpenShift Container Platform 4.5 and 4.4 this can be mitigated by removing CAP_NET_RAW
from the default cri-o capabilities provided to pods (NOTE: This may prevent ping
from working in unprivileged pods. This fix has not been validated for OpenShift 4.3 or below):
Create this MachineConfig object via e.g. oc apply
. More information about MachineConfig can be found here:
https://github.com/openshift/machine-config-operator
https://docs.openshift.com/container-platform/4.5/architecture/architecture-rhcos.html
In order to monitor the rollout of this change, use oc describe machineconfigpool/worker
.
Check for any pods which start to crash after this is applied; they may need to be adjusted request CAP_NET_RAW
explicitly. More information:
https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-capabilities-for-a-container
https://docs.openshift.com/container-platform/4.5/authentication/managing-security-context-constraints.html
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Not affected | ||
Red Hat Enterprise Linux 6 | kernel | Not affected | ||
Red Hat Enterprise Linux 7 | kernel | Not affected | ||
Red Hat Enterprise Linux 7 | kernel-alt | Not affected | ||
Red Hat Enterprise Linux 7 | kernel-rt | Not affected | ||
Red Hat Enterprise MRG 2 | kernel | Not affected | ||
Red Hat Enterprise Linux 8 | kernel-rt | Fixed | RHSA-2020:4289 | 20.10.2020 |
Red Hat Enterprise Linux 8 | kernel | Fixed | RHSA-2020:4286 | 20.10.2020 |
Red Hat Enterprise Linux 8 | kpatch-patch | Fixed | RHSA-2020:4331 | 26.10.2020 |
Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions | kernel | Fixed | RHSA-2020:5199 | 24.11.2020 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.8 High
CVSS3
Связанные уязвимости
A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.
A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.
A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption ...
EPSS
7.8 High
CVSS3