Vulnerability Name: | CVE-2022-1015 (CCN-222845) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2022-03-28 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2022-03-28 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-23 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Linux Kernel could allow a local authenticated attacker to gain elevated privileges on the system, caused by an out-of-bounds access in nf_tables expression evaluation due to validation of user register indices. By overwriting a stack return address OOB with a specially-crafted nft_expr_payload, an authenticated attacker could exploit this vulnerability to gain elevated privileges on the system. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.6 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) 5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: secalert@redhat.com Type: Exploit, Third Party Advisory secalert@redhat.com Source: MITRE Type: CNA CVE-2022-1015 Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Red Hat Bugzilla - Bug 2065323 CVE-2022-1015 kernel: arbitrary code execution in linux/net/netfilter/nf_tables_api.c Source: secalert@redhat.com Type: Exploit, Issue Tracking, Third Party Advisory secalert@redhat.com Source: XF Type: UNKNOWN linux-kernel-cve20221015-priv-esc(222845) Source: CCN Type: oss-sec Mailing List, Mon, 28 Mar 2022 20:28:21 +0200 Linux kernel: CVE-2022-1015,CVE-2022-1016 in nf_tables cause privilege escalation, information leak Source: secalert@redhat.com Type: Exploit, Mailing List, Third Party Advisory secalert@redhat.com Source: CCN Type: Linux Kernel Web site The Linux Kernel Archives Source: CCN Type: Mend Vulnerability Database CVE-2022-1015 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |