Total vulnerabilities in the database
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
Software | From | Fixed in |
---|---|---|
debian / debian_linux | 11.0 | 11.0.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 20.04 | 20.04.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 22.04 | 22.04.x |
linux / linux_kernel | 5.11 | 5.15.54 |
linux / linux_kernel | 5.16 | 5.18.11 |
linux / linux_kernel | 5.5 | 5.10.130 |
linux / linux_kernel | 4.20 | 5.4.244 |
linux / linux_kernel | 4.15 | 4.19.284 |
linux / linux_kernel | 4.1 | 4.14.316 |