net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://www.openwall.com/lists/oss-security/2022/02/21/2 | mailing list third party advisory exploit |
https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6 | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2022/02/22/1 | patch mailing list third party advisory |
https://www.debian.org/security/2022/dsa-5095 | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |
https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/ | third party advisory exploit |
https://github.com/Bonfee/CVE-2022-25636 | third party advisory exploit |
http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html | third party advisory vdb entry |
https://security.netapp.com/advisory/ntap-20220325-0002/ | third party advisory |