7.2
CVSSv2

CVE-2022-34918

Published: 04/07/2022 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 644
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in the Linux kernel up to and including 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local malicious user to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

debian debian linux 11.0

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

canonical ubuntu linux 20.04

canonical ubuntu linux 16.04

canonical ubuntu linux 22.04

netapp h300s_firmware -

netapp h500s_firmware -

netapp h700s_firmware -

netapp h410s_firmware -

netapp h410c_firmware -

Vendor Advisories

Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this upd ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to privilege escalation, denial of service or information leaks: CVE-2021-33655 A user with access to a framebuffer console driver could cause a memory out-of-bounds write via the FBIOPUT_VSCREENINFO ioctl CVE-2022-2318 A use-after-free in the Amateur Radio ...
A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_apic function in the Linux kernel This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation (CVE-2022-2586) A heap buffer overflow flaw was found in the Linux ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
An issue was discovered in the Linux kernel through 5189 A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250 (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN ...
A heap buffer overflow flaw was found in the Linux kernel's Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type This flaw allows a local user to crash or potentially escalate their privileges on the system (CVE-2022-34918) ...
A heap buffer overflow flaw was found in the Linux kernel's Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type This flaw allows a local user to crash or potentially escalate their privileges on the system (CVE-2022-34918) ...
A heap buffer overflow flaw was found in the Linux kernel's Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type This flaw allows a local user to crash or potentially escalate their privileges on the system (CVE-2022-34918) ...
There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timerc of linux that allow attackers to crash linux kernel without any privileges (CVE-2022-2318) Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE] Lin ...
Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740) Additionally the granularity of the grant ta ...
An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data This flaw allows a local user to crash or potentially escalate their privileges on the system (CVE-2021-33655) A bug in the IMA subsystem was discovered which ...
A heap buffer overflow flaw was found in the Linux kernel's Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type This flaw allows a local user to crash or potentially escalate their privileges on the system (CVE-2022-34918) ...
A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_apic function in the Linux kernel This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation (CVE-2022-2586) A heap buffer overflow flaw was found in the Linux ...

Exploits

An issue was discovered in the Linux kernel through version 5189 A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access The issue exists in nft_setelem ...

Github Repositories

CVE-2022-34918 netfilter nf_tables 本地提权 POC

CVE-2022-34918 LPE POC 尝试结合了一下360提出的USMA利用思路,还不错。 Chinese writeup: CVE-2022-34918 netfilter 分析笔记 基于USMA的内核通用EXP编写思路在 CVE-2022-34918 上的实践 !! For educational / research purposes only Use at your own risk !! (poc below in under poc_keyring_normal folder) 参考 githubcom/randorisec/CVE-20

CVE-2022-34918 LPE PoC LPE exploit for CVE-2022-34918 This exploit has been written for the kernel Linux ubuntu 5150-39-generic You can find the associated write-up on our blog Usage get_root should be in the current folder $ ls get_root poc $ /poc

Shared object ELF injection examples. Bridgehead shellcode for multi-stage payload. Custom Loader tool to inject and run shared objects in a PIE manner

Pull requests are welcomed Try to run the given injection techniques code Understand how each technique works Understand the attack vector and the different parts (stages) of the chain (ie the bridgehead shellcode, injection to process memory,LPE, when to create a new process etc) Describe the need for a custom statically PIC compiled elf (Shared object library) loader

An eBPF assisted Randomization Allocator

ERA-eBPF-assisted-Randomize-Allocator cite: @Article{1, title = {基于eBPF的内核堆漏洞动态缓解机制}, author = {王子成,郭迎港,钟炳南,陈越琦,曾庆凯}, journal = {软件学报}, volume = {}, number = {}, pages = {1}, numpages = {}, year = {}, month = {}, doi = {1013328/jcnkijos006923}, publisher = {科学出版社} }

CVE-2023-1829 The exploitation is tested on Ubuntu2204 official source code 5150-2525 Installing dependences for some netlink filter functions sudo apt install libnftnl-dev libmnl-dev Building step: make References githubcom/randorisec/CVE-2022-34918-LPE-PoC/tree/main

CVE-2022-34918 LPE PoC LPE exploit for CVE-2022-34918 This exploit has been written for the kernel Linux ubuntu 5150-39-generic You can find the associated write-up on our blog Usage get_root should be in the current folder $ ls get_root poc $ /poc

CVE-2022-34918 LPE PoC LPE exploit for CVE-2022-34918 This exploit has been written for the kernel Linux ubuntu 5150-39-generic You can find the associated write-up on our blog Usage get_root should be in the current folder $ ls get_root poc $ /poc CVE-2022-34918

CVE-2022-34918 LPE PoC LPE exploit for CVE-2022-34918 This exploit has been written for the kernel Linux ubuntu 5150-39-generic You can find the associated write-up on our blog Usage get_root should be in the current folder $ ls get_root poc $ /poc License Copyright 2022, RandoriSec Redistribution and use in source and binary forms, w

rapport pentest d'un site web de gestion de secrets

Auteur Année Kalidou - @aethelwulf - kalidoume 2024 Pentest - Sécurité Applicative Rapport d'audit pentest Présenté par : Kalidou DIA Plan Introduction I Énumération II Détection de vulnérabilités III Exploitation des vulnérabilités Introduction C

This is one exploit to kernel linux

CVE2023-1829 The exploitation is tested on Ubuntu2204 official source code 5150-2525 Installing dependences for some netlink filter functions sudo apt install libnftnl-dev libmnl-dev Building step: make References githubcom/randorisec/CVE-2022-34918-LPE-PoC/tree/main