Skip to content

Linux Kernel use-after-free write in netfilter

Moderate
frezbo published GHSA-p5h6-gpc8-m5vf Jul 5, 2022

Package

No package listed

Affected versions

<= v1.0.5

Patched versions

>= v1.1.0, >= v1.0.6

Description

Impact

net/netfilter/nf_tables_api.c in the Linux kernel allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.

Kubernetes workloads running in Talos are not affected since user namespaces are disabled in Talos kernel config. So an unprivileged user cannot obtain CAP_NET_ADMIN by unsharing. However untrusted workloads that run with privileged: true or having NET_ADMIN capability poses a risk.

Patches

The fix has been backported to 5.15.45 version of the upstream Linux kernel (5.15 is the upstream Kernel long term version Talos ships with). Talos >= v1.1.0 is shipped with Linux Kernel 5.15.48 and Talos >= v1.0.6 is shipped with Linux kernel 5.15.45 fixing the above issue.

Workarounds

Audit kubernetes workloads running in the cluster with privileged: true set or having NET_ADMIN capability and assess the threat vector.

References

For more information

Severity

Moderate

CVE ID

CVE-2022-32250

Weaknesses

No CWEs