|
Message-ID: <20220806191022.GA10830@openwall.com> Date: Sat, 6 Aug 2022 21:10:22 +0200 From: Solar Designer <solar@...nwall.com> To: "?????????(??????)" <zhangziming.zzm@...group.com> Cc: oss-security <oss-security@...ts.openwall.com> Subject: Re: CVE-2022-1972: out-of-bound write in Linux netfilter subsystem leads to local privilege escalation On Thu, Jun 02, 2022 at 10:21:36AM +0800, ?????????(??????) wrote: > An out-of-bound write vulnerability was identified within the > netfilter subsystem > which can be exploited to achieve privilege escalation to root. > > In order to trigger the issue it requires the ability to create user/net > namespaces. > > this vulnerability comes from commit( > https://github.com/torvalds/linux/commit/f3a2181e16f1dcbf5446ed43f6b5d9f56c459f85) > > This issue has been fixed within the following commit: > > https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=fecf31ee395b0295f2d7260aa29946b7605f7c85 [...] > =*=*=*=*=*=*=*=*= Credit =*=*=*=*=*=*=*=*= > ziming zhang(@ezrak1e) from Ant Group Light-Year Security Lab Apparently, this vulnerability was also independently discovered by Arthur Mongodin during an internship at Randorisec, who blogged about it on June 13 here: https://randorisec.fr/yet-another-bug-netfilter/ and posted an infoleak PoC here: https://github.com/randorisec/CVE-2022-1972-infoleak-PoC Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.