7.8

CVE-2022-32250

Exploit

net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 4.1 < 4.9.318
LinuxLinux Kernel Version >= 4.10 < 4.14.283
LinuxLinux Kernel Version >= 4.15 < 4.19.247
LinuxLinux Kernel Version >= 4.20 < 5.4.198
LinuxLinux Kernel Version >= 5.5 < 5.10.120
LinuxLinux Kernel Version >= 5.11 < 5.15.45
LinuxLinux Kernel Version >= 5.16 < 5.17.13
LinuxLinux Kernel Version >= 5.18 < 5.18.2
FedoraprojectFedora Version35
FedoraprojectFedora Version36
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
NetappH300s Firmware Version-
   NetappH300s Version-
NetappH500s Firmware Version-
   NetappH500s Version-
NetappH700s Firmware Version-
   NetappH700s Version-
NetappH410s Firmware Version-
   NetappH410s Version-
NetappH410c Firmware Version-
   NetappH410c Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.1% 0.834
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.

http://www.openwall.com/lists/oss-security/2022/06/03/1
Patch
Third Party Advisory
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2022/06/04/1
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2022/08/25/1
Patch
Third Party Advisory
Mailing List
https://bugzilla.redhat.com/show_bug.cgi?id=2092427
Third Party Advisory
Issue Tracking
https://www.openwall.com/lists/oss-security/2022/05/31/1
Patch
Third Party Advisory
Exploit
Mailing List