
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability has been identified in the netfilter nf_tables component. When performing lookups for sets on the same batch using its ID, a set from a different table could be used. This issue could lead to a potential use-after-free vulnerability when the table is removed while still maintaining a reference to the freed set (NVD, Wiz).
The vulnerability occurs in the netfilter's nftables functionality where SET_ID references could point to sets in other tables. When looking up sets by ID, the system failed to restrict the lookup to sets belonging to the same table that was used for the lookup by name. This could result in maintaining references to sets after they have been freed, leading to a use-after-free condition. This vulnerability is related to and fixes CVE-2022-2586 (also reported as ZDI-CAN-17470) (NVD, Wiz).
If exploited, this vulnerability could allow an attacker to potentially execute arbitrary code or cause system crashes through the use-after-free condition. The vulnerability affects the kernel's network filtering subsystem, which is a critical component for system security (Wiz).
The vulnerability has been resolved by modifying the set lookup behavior to ensure that when looking for sets by ID, only sets belonging to the same table that was used for the lookup by name are returned. Users should update their Linux kernel to a version containing the fix (Wiz).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."