|
Mitigation: If unprivileged user namespaces are not needed, set the kernel.unprivileged_userns_clone sysctl to 0: |
|
|
|
$ sudo sysctl kernel.unprivileged_userns_clone=0 |
|
|
- |
This prevents straight forward exploitation, however the vulnerability can still be triggered by an attacker by gaining code execution to an unprivileged processes that has the CAP_NET_RAW capability set. |
+ |
This prevents straight forward exploitation, however the vulnerability can still be triggered by an attacker by gaining code execution to an unprivileged processes that has the CAP_NET_RAW capability set and the system does not restrict the capability. |