CVE-2022-2586
Linux Kernel Use-After-Free Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
YesDecision
Descriptions
It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.
Se descubrió que un objeto o expresión nft podía hacer referencia a un conjunto nft en una tabla nft diferente, lo que generaba un use-after-free una vez que se eliminaba esa tabla.
A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation.
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the handling of nft_objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
Linux Kernel contains a use-after-free vulnerability in the nft_object, allowing local attackers to escalate privileges.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2022-07-29 CVE Reserved
- 2022-08-10 CVE Published
- 2022-09-03 First Exploit
- 2024-06-26 Exploited in Wild
- 2024-07-17 KEV Due Date
- 2024-08-19 CVE Updated
- 2024-09-19 EPSS Updated
CWE
- CWE-416: Use After Free
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586 | Issue Tracking | |
https://ubuntu.com/security/notices/USN-5557-1 | Third Party Advisory | |
https://ubuntu.com/security/notices/USN-5560-1 | Third Party Advisory | |
https://ubuntu.com/security/notices/USN-5560-2 | Third Party Advisory | |
https://ubuntu.com/security/notices/USN-5562-1 | Third Party Advisory | |
https://ubuntu.com/security/notices/USN-5564-1 | Third Party Advisory | |
https://ubuntu.com/security/notices/USN-5565-1 | Third Party Advisory | |
https://ubuntu.com/security/notices/USN-5566-1 | Third Party Advisory | |
https://ubuntu.com/security/notices/USN-5567-1 | Third Party Advisory | |
https://ubuntu.com/security/notices/USN-5582-1 | Third Party Advisory | |
https://www.openwall.com/lists/oss-security/2022/08/09/5 | Issue Tracking | |
https://www.zerodayinitiative.com/advisories/ZDI-22-1118 | Issue Tracking |
URL | Date | SRC |
---|---|---|
https://github.com/aels/CVE-2022-2586-LPE | 2022-09-03 | |
https://github.com/sniper404ghostxploit/CVE-2022-2586 | 2022-11-06 |
URL | Date | SRC |
---|---|---|
https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t | 2024-06-27 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2022-2586 | 2024-02-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2114878 | 2024-02-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 5.19.17 Search vendor "Linux" for product "Linux Kernel" and version " <= 5.19.17" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 20.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "20.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 22.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "22.04" | lts |
Affected
|