CVE-2022-32250 — Use After Free in Kernel
Severity
7.8HIGHNVD
EPSS
1.9%
top 16.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 2
Latest updateOct 25
Description
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages8 packages
Also affects: Debian Linux 10.0, 11.0, 9.0, Ubuntu Linux 14.04, 16.04, 18.04, 20.04, 22.04, Fedora 35, 36
Patches
🔴Vulnerability Details
5📋Vendor Advisories
10Microsoft▶
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges a differen↗2022-07-12