vulnerability
Red Hat: CVE-2022-32250: CVE-2022-32250 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 2022-06-02 | 2022-07-14 | 2024-11-27 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
2022-06-02
Added
2022-07-14
Modified
2024-11-27
Description
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
Solution(s)
redhat-upgrade-kernelredhat-upgrade-kernel-rt
References
- NVD-CVE-2022-32250
- REDHAT-RHSA-2022:5214
- REDHAT-RHSA-2022:5216
- REDHAT-RHSA-2022:5220
- REDHAT-RHSA-2022:5224
- REDHAT-RHSA-2022:5232
- REDHAT-RHSA-2022:5236
- REDHAT-RHSA-2022:5249
- REDHAT-RHSA-2022:5267
- REDHAT-RHSA-2022:5476
- REDHAT-RHSA-2022:5626
- REDHAT-RHSA-2022:5633
- REDHAT-RHSA-2022:5641
- REDHAT-RHSA-2022:5819
- REDHAT-RHSA-2022:5834
- REDHAT-RHSA-2022:5839

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.