{"id":"CVE-2022-34918","details":"An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.","modified":"2026-04-16T04:33:33.855875032Z","published":"2022-07-04T21:15:07.730Z","related":["ALSA-2022:6582","ALSA-2022:6610","SUSE-SU-2022:2376-1","SUSE-SU-2022:2424-1","SUSE-SU-2022:2424-2","SUSE-SU-2022:2520-1","SUSE-SU-2022:2549-1","SUSE-SU-2022:2615-1","SUSE-SU-2022:2696-1","SUSE-SU-2022:2726-1","SUSE-SU-2022:2727-1","SUSE-SU-2022:2732-1","SUSE-SU-2022:2738-1","SUSE-SU-2022:2759-1","SUSE-SU-2022:2766-1","SUSE-SU-2022:2770-1","SUSE-SU-2022:2854-1","openSUSE-SU-2022:2549-1","openSUSE-SU-2024:12181-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452%40randorisec.fr/T/#u"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5191"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/08/06/5"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220826-0004/"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6"},{"type":"EVIDENCE","url":"https://www.openwall.com/lists/oss-security/2022/07/02/3"},{"type":"EVIDENCE","url":"https://www.randorisec.fr/crack-linux-firewall/"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2022/07/05/1"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.1"},{"fixed":"4.14.316"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.284"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.244"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.130"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.54"}]},{"events":[{"introduced":"5.16"},{"fixed":"5.18.11"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"last_affected":"22.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-34918.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}