CVE-2022-32250

7.8 HIGH

📋 TL;DR

This vulnerability in the Linux kernel's netfilter component allows a local user with namespace creation privileges to escalate to root via a use-after-free condition. It affects Linux kernel versions up to 5.18.1. Attackers need local access and ability to create user/net namespaces.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Up to and including 5.18.1
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires CAP_NET_ADMIN or ability to create user/net namespaces. Container environments may be particularly vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, allowing complete system compromise, data theft, persistence establishment, and lateral movement.

🟠

Likely Case

Privileged attackers or compromised low-privilege accounts escalate to root, gaining full control over affected systems.

🟢

If Mitigated

With proper namespace restrictions and least privilege, impact limited to isolated containers or namespaces.

🌐 Internet-Facing: LOW - Requires local access; cannot be exploited remotely.
🏢 Internal Only: HIGH - Local attackers or compromised accounts can achieve root privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires local access and namespace creation capabilities. Multiple public references discuss exploitation details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel 5.18.2 and later

Vendor Advisory: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=520778042ccca019f3ffa136dd0ca565c486cedd

Restart Required: Yes

Instructions:

1. Update Linux kernel to 5.18.2 or later. 2. Reboot system. 3. Check with distribution vendor for backported patches if using older kernel series.

🔧 Temporary Workarounds

Restrict namespace creation

linux

Limit ability to create user and network namespaces to prevent exploitation.

sysctl -w user.max_user_namespaces=0
sysctl -w user.max_net_namespaces=0

Disable nf_tables module

linux

Unload the vulnerable nf_tables kernel module if not required.

rmmod nf_tables

🧯 If You Can't Patch

  • Implement strict namespace restrictions using sysctl or container runtime configurations
  • Apply principle of least privilege - restrict CAP_NET_ADMIN and namespace creation capabilities

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r. If version is 5.18.1 or earlier, system is vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is 5.18.2 or later: uname -r

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages related to nf_tables
  • Unexpected privilege escalation events
  • Namespace creation by unauthorized users

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND ("nf_tables" OR "use-after-free") OR event="privilege_escalation"

🔗 References

📤 Share & Export