Hide Forgot
Linux kernels which support unprivileged user namespaces (CLONE_NEWUSER) and at the same time allow sharing file system information (CLONE_FS) between parent process and its newly clone(2)d child process in the new user namespace, are vulnerable to a privilege escalation flaw as presented by Sebastian Krahmer in his chroot exploit [1]. [1] http://stealth.openwall.net/xSports/clown-newuser.c An unprivileged local user could use this flaw to gain root privileges on a system. Upstream fix: ------------- -> https://git.kernel.org/linus/e66eded8309ebf679d3d3c1f5820d1f2ca332c71 Reference: ---------- -> http://www.openwall.com/lists/oss-security/2013/03/13/8
Statement: This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2. This issue did not affect the versions of the Linux kernel as shipped with Fedora 17 and 18 as they were not built with CONFIG_USER_NS configuration option.