Skip to content

Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init

Moderate
frezbo published GHSA-6pc8-c2v4-p354 Jul 13, 2022

Package

No package listed

Affected versions

<= v1.1.0

Patched versions

>= v1.1.1

Description

Impact

An issue was discovered in the Linux kernel. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.

Kubernetes workloads running in Talos are not affected since user namespaces are disabled in Talos kernel config. So an unprivileged user cannot obtain CAP_NET_ADMIN by unsharing. However untrusted workloads that run with privileged: true or having NET_ADMIN capability poses a risk.

Patches

The fix has been backported to 5.15.54 version of the upstream Linux kernel (5.15 is the upstream Kernel long term version Talos ships with). Talos >= v1.1.1 is shipped with Linux Kernel 5.15.54 fixing the above issue.

Workarounds

Audit kubernetes workloads running in the cluster with privileged: true set or having NET_ADMIN capability and assess the threat vector.

References

For more information

If you have any questions or comments about this advisory:

Severity

Moderate

CVE ID

CVE-2022-34918

Weaknesses

No CWEs