Headline
CVE-2022-42432: ZDI-22-1457
This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540.
October 21st, 2022
Linux Kernel nftables Uninitialized Variable Information Disclosure Vulnerability****ZDI-22-1457
ZDI-CAN-18540
CVE ID
CVE-2022-42432
CVSS SCORE
5.1, (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L)
AFFECTED VENDORS
Linux
AFFECTED PRODUCTS
Kernel
VULNERABILITY DETAILS
This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel.
ADDITIONAL DETAILS
Linux has issued an update to correct this vulnerability. More details can be found at:
https://patchwork.ozlabs.org/project/netfilter-devel/patch/[email protected]/
DISCLOSURE TIMELINE
- 2022-09-06 - Vulnerability reported to vendor
- 2022-10-21 - Coordinated public release of advisory
CREDIT
Gwangun Jung at THEORI
BACK TO ADVISORIES
Related news
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.