Vulnerability DatabaseGHSA-jr8j-2jhp-m67v

GHSA-jr8j-2jhp-m67v
vulnerability analysis and mitigation

Overview

A vulnerability was discovered in the Linux kernel's net/netfilter/nftablesapi.c component, specifically affecting the nftverdictinit function. The issue, identified as GHSA-jr8j-2jhp-m67v and CVE-2022-39190, was published on September 8, 2022, and affects Talos versions below 1.2.0. This moderate severity vulnerability involves improper resource management when binding to an already bound chain (GitHub Advisory).

Technical details

The vulnerability exists in the nftverdictinit function within net/netfilter/nftablesapi.c of the Linux kernel. The core issue stems from improper resource management where the program does not release or incorrectly releases a resource before it is made available for re-use. This occurs specifically when attempting to bind to a chain that is already bound (SESIN Report).

Impact

When exploited, this vulnerability can lead to a denial of service condition in the affected systems. The manipulation of unknown input in the nftverdictinit function can trigger this denial of service state, potentially affecting system availability (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Talos version 1.2.0 and later releases. The fix has been backported to Linux kernel version 5.15.64, which is the upstream kernel long-term version that Talos ships with. Users are recommended to upgrade to Talos version 1.2.0 or later to address this vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management