vulnerability
Red Hat: CVE-2022-32250: CVE-2022-32250 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Jun 2, 2022 | Jul 14, 2022 | Aug 11, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Jun 2, 2022
Added
Jul 14, 2022
Modified
Aug 11, 2025
Description
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
Solutions
redhat-upgrade-kernelredhat-upgrade-kernel-rt
References
- CWE-416
- NVD-CVE-2022-32250
- REDHAT-RHSA-2022:5214
- REDHAT-RHSA-2022:5216
- REDHAT-RHSA-2022:5220
- REDHAT-RHSA-2022:5224
- REDHAT-RHSA-2022:5232
- REDHAT-RHSA-2022:5236
- REDHAT-RHSA-2022:5249
- REDHAT-RHSA-2022:5267
- REDHAT-RHSA-2022:5476
- REDHAT-RHSA-2022:5626
- REDHAT-RHSA-2022:5633
- REDHAT-RHSA-2022:5641
- REDHAT-RHSA-2022:5819
- REDHAT-RHSA-2022:5834
- REDHAT-RHSA-2022:5839

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.