vulnerability

CentOS Linux: CVE-2022-32250: Important: kpatch-patch security update (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
2022-06-02
Added
2022-07-14
Modified
2023-05-25

Description

net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.

Solution(s)

centos-upgrade-kernelcentos-upgrade-kernel-rtcentos-upgrade-kpatch-patch-3_10_0-1160_36_2centos-upgrade-kpatch-patch-3_10_0-1160_36_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_41_1centos-upgrade-kpatch-patch-3_10_0-1160_41_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_42_2centos-upgrade-kpatch-patch-3_10_0-1160_42_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_45_1centos-upgrade-kpatch-patch-3_10_0-1160_45_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_49_1centos-upgrade-kpatch-patch-3_10_0-1160_49_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_53_1centos-upgrade-kpatch-patch-3_10_0-1160_53_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_59_1centos-upgrade-kpatch-patch-3_10_0-1160_59_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_62_1centos-upgrade-kpatch-patch-3_10_0-1160_62_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_66_1centos-upgrade-kpatch-patch-3_10_0-1160_66_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-372_13_1centos-upgrade-kpatch-patch-4_18_0-372_13_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-372_13_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-372_16_1centos-upgrade-kpatch-patch-4_18_0-372_16_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-372_16_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-372_9_1centos-upgrade-kpatch-patch-4_18_0-372_9_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-372_9_1-debugsourcecentos-upgrade-kpatch-patch-5_14_0-70_13_1centos-upgrade-kpatch-patch-5_14_0-70_13_1-debuginfocentos-upgrade-kpatch-patch-5_14_0-70_13_1-debugsource
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.