Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-22555

Опубликовано: 07 июл. 2021
Источник: redhat
CVSS3: 7.8
EPSS Высокий

Описание

A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space

A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.

Отчет

For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug. For the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.

Меры по смягчению последствий

The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command: echo 0 > /proc/sys/user/max_user_namespaces For making this change in configuration permanent. Note: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable. Configure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the "/etc/sysctl.d/" directory: user.max_user_namespaces = 0 The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system The other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernel-altAffected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2021:332831.08.2021
Red Hat Enterprise Linux 7kernelFixedRHSA-2021:332731.08.2021
Red Hat Enterprise Linux 7kpatch-patchFixedRHSA-2021:338131.08.2021
Red Hat Enterprise Linux 7.2 Advanced Update SupportkernelFixedRHSA-2021:339931.08.2021
Red Hat Enterprise Linux 7.3 Advanced Update SupportkernelFixedRHSA-2021:332131.08.2021
Red Hat Enterprise Linux 7.4 Advanced Update SupportkernelFixedRHSA-2021:372505.10.2021
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118)kernelFixedRHSA-2021:381212.10.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1980101kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c

EPSS

Процентиль: 99%
0.84311
Высокий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.3
ubuntu
почти 4 года назад

A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space

CVSS3: 8.3
nvd
почти 4 года назад

A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space

CVSS3: 8.3
debian
почти 4 года назад

A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was disco ...

CVSS3: 7.8
fstec
около 4 лет назад

Уязвимость функции xt_compat_target_from_user() (net/netfilter/x_tables.c) подсистемы netfilter операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

suse-cvrf
почти 4 года назад

Security update for the Linux Kernel

EPSS

Процентиль: 99%
0.84311
Высокий

7.8 High

CVSS3