vulnerability
Arch Linux: Out-of-bounds Write (CVE-2022-1015)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Apr 29, 2022 | Jul 11, 2025 | Feb 10, 2026 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Apr 29, 2022
Added
Jul 11, 2025
Modified
Feb 10, 2026
Description
CVE-2022-1015 pertains to an out of bounds access in nf_tables expression evaluation due to validation of user register indices. It leads to local privilege escalation, for example by overwriting a stack return address OOB with a crafted nft_expr_payload. CVE-2022-1015 is exploitable starting from commit 345023b0db3 ("netfilter: nftables: add nft_parse_register_store() and use it"), v5.12 and has been fixed in commit 6e1acfa387b9 ("netfilter: nf_tables: validate registers coming from userspace.").
Solution
arch-linux-upgrade-latest
References
- CVE-2022-1015
- https://attackerkb.com/topics/CVE-2022-1015
- URL-http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
- URL-http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
- URL-http://www.openwall.com/lists/oss-security/2022/08/25/2
- URL-http://www.openwall.com/lists/oss-security/2023/01/13/2
- URL-http://www.openwall.com/lists/oss-security/2023/02/23/1
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2065323
- URL-https://seclists.org/oss-sec/2022/q1/205
- CWE-787
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.