| |
Mitigation: If unprivileged user namespaces are not needed, set the kernel.unprivileged_userns_clone sysctl to 0: |
| |
|
| |
$ sudo sysctl kernel.unprivileged_userns_clone=0 |
| |
|
| - |
This prevents straight forward exploitation, however the vulnerability can still be triggered by an attacker by gaining code execution to an unprivileged processes that has the CAP_NET_RAW capability set. |
| + |
This prevents straight forward exploitation, however the vulnerability can still be triggered by an attacker by gaining code execution to an unprivileged processes that has the CAP_NET_RAW capability set and the system does not restrict the capability. |