Linux Kernel Filter Implementation Vulnerability in Various Products
CVE-2022-2588
Key Information:
- Vendor
- The Linux Kernel Organization
- Status
- Linux
- Vendor
- CVE Published:
- 8 January 2024
Badges
Summary
A vulnerability has been identified in the cls_route filter implementation of the Linux kernel. This flaw can result in failure to remove an old filter from the hashtable before it is freed, particularly if the filter's handle is set to 0. This oversight can potentially lead to unanticipated behaviors in the system, affecting the stability and security of various applications relying on the kernel's routing capabilities. Users and administrators of affected systems should ensure they have the latest security updates applied to mitigate any risks associated with this vulnerability.
Affected Version(s)
linux Linux 0 < 6.0~rc1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
Vulnerability published
- π‘
Public PoC available
- πΎ
Exploit known to exist