Vulnerability Description
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.1, < 4.9.318 |
| Fedoraproject | Fedora | 35 |
| Debian | Debian Linux | 9.0 |
| Netapp | H300S Firmware | - |
| Netapp | H300S | - |
| Netapp | H500S Firmware | - |
| Netapp | H500S | - |
| Netapp | H700S Firmware | - |
| Netapp | H700S | - |
| Netapp | H410S Firmware | - |
| Netapp | H410S | - |
| Netapp | H410C Firmware | - |
| Netapp | H410C | - |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2022/06/03/1ExploitMailing ListPatch
- http://www.openwall.com/lists/oss-security/2022/06/04/1Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2022/06/20/1Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2022/07/03/5Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2022/07/03/6Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2022/08/25/1Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2022/09/02/9Mailing ListThird Party Advisory
- https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/ExploitThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2092427Issue TrackingThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilMailing ListPatchVendor Advisory
- https://github.com/theori-io/CVE-2022-32250-exploitExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.netapp.com/advisory/ntap-20220715-0005/Third Party Advisory
FAQ
What is CVE-2022-32250?
CVE-2022-32250 is a vulnerability with a CVSS score of 7.8 (HIGH). net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check le...
How severe is CVE-2022-32250?
CVE-2022-32250 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-32250?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Fedoraproject Fedora, Debian Debian Linux, Netapp H300S Firmware, Netapp H300S.