Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 4 Jun 2022 22:03:32 +0200
From: Solar Designer <>
Cc: Marian Rehak <>, EDG EDG <>
Subject: Re: Linux Kernel use-after-free write in netfilter

On Fri, Jun 03, 2022 at 08:31:41AM +0200, Salvatore Bonaccorso wrote:
> On Tue, May 31, 2022 at 10:00:32AM +0100, EDG EDG wrote:
> > A use-after-free write vulnerability was identified within the
> > netfilter subsystem
> > which can be exploited to achieve privilege escalation to root.
> > 
> > In order to trigger the issue it requires the ability to create user/net
> > namespaces.
> > 
> > This issue has been fixed within the following commit:
> > 
> >
> > 
> > The issue was previously confirmed on the latest linux master (commit
> > 143a6252e1b8ab424b4b293512a97cca7295c182) and we have confirmed it can be
> > exploited for privilege escalation on Ubuntu 22.04 (Linux kernel
> > 5.15.0-27-generic).

> FTR, this was assigned CVE-2022-1966 by Red Hat:
> .
> There is though as well now
> . I have asked MITRE
> to possibly reject the later one.

Also, as Linus added to the private thread, the fix commit is now in:

> Just a note to say for anybody tracking the progress of this that the
> fix is in my tree now as commit 520778042ccc ("netfilter: nf_tables:
> disallow non-stateful expression in sets earlier")
>                  Linus


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.