Skip to content

OSG-SEC-2022-01-25 CRITICAL heap buffer overflow vulnerability in Linux kernel for RHEL 8 and derivatives

Dear OSG Security Contacts,

A heap buffer overflow has been found in the Linux kernel for RHEL 8 and derivative operating systems. Exploitation of this vulnerability could allow an unprivileged user to elevate privileges on the system [1][2].

IMPACTED VERSIONS:

RHEL 8 systems and derivatives running containers and/or with user namespaces enabled.

WHAT ARE THE VULNERABILITIES:

A heap-based buffer overflow flaw in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length which could be used for privilege escalation.

WHAT YOU SHOULD DO:

Update to a fixed kernel version when available for your distribution. [3][4][5]

MITIGATIONS

On systems not running containers, you can disable user namespaces by setting user.max_user_namespaces to 0 [1]: RHEL 8: echo "user.max_user_namespaces=0" \ > /etc/sysctl.d/userns.conf sysctl -p /etc/sysctl.d/userns.conf

CentOS 8: echo "user.max_user_namespaces = 0" \ > /etc/sysctl.d/90-max_user_namespaces.conf sysctl -p /etc/sysctl.d/90-max_user_namespaces.conf

REFERENCES

[1] https://access.redhat.com/security/cve/CVE-2022-0185

[2] https://sysdig.com/blog/cve-2022-0185-container-escape/

[3] https://access.redhat.com/errata/RHSA-2022:0188

[4] https://security-tracker.debian.org/tracker/CVE-2022-0185

[5] https://ubuntu.com/security/CVE-2022-0185

Please contact the OSG security team at [email protected] if you have any questions or concerns.

OSG Security Team