The customer is asking for a possible security patch, as there is none provided by the debian security tracker.
UCS 5.0 uses "nf_tables": # uname -r 4.19.0-26-amd64 # grep -o nf_table /proc/modules nf_tables According to [Ubuntu](https://ubuntu.com/security/CVE-2024-1086) the vulnerability can be mitigated by disabling "unprivileged user name space cloning": # sysctl kernel.unprivileged_userns_clone kernel.unprivileged_userns_clone = 0 So UCS should not be vulnerable by default — unless when you add your own (exploitable) firewall rules, in which case you are already "root" and do not need the exploit to become root: Attack-Vector (AV) is "Local".
Fixed for UCS 5.0-9 with Errata update for Bug 57414: <https://errata.software-univention.de/#/?erratum=5.0x1077> <https://errata.software-univention.de/#/?erratum=5.0x1078> <https://errata.software-univention.de/#/?erratum=5.0x1079> *** This bug has been marked as a duplicate of bug 57414 ***