vulnerability
Amazon Linux AMI 2: CVE-2022-32250: Security patch for kernel (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 06/02/2022 | 09/30/2022 | 11/27/2024 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
06/02/2022
Added
09/30/2022
Modified
11/27/2024
Description
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
Solution(s)
amazon-linux-ami-2-upgrade-bpftoolamazon-linux-ami-2-upgrade-bpftool-debuginfoamazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-285-215-501amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-126-117-518amazon-linux-ami-2-upgrade-kernel-livepatch-5-15-50-23-125amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo
References
- AMAZON-AL2/ALAS-2022-1813
- AMAZON-AL2/ALASKERNEL-5.10-2022-015
- AMAZON-AL2/ALASKERNEL-5.10-2022-016
- AMAZON-AL2/ALASKERNEL-5.10-2022-017
- AMAZON-AL2/ALASKERNEL-5.15-2022-002
- AMAZON-AL2/ALASKERNEL-5.15-2022-003
- AMAZON-AL2/ALASKERNEL-5.15-2022-004
- AMAZON-AL2/ALASKERNEL-5.4-2022-028
- AMAZON-AL2/ALASKERNEL-5.4-2022-030
- AMAZON-AL2/ALASKERNEL-5.4-2022-032
- CVE-2022-32250
- https://attackerkb.com/topics/CVE-2022-32250

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.