Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Conversation

Notices

  1. GeniusMusing (geniusmusing@nu.federati.net)'s status on Tuesday, 15-Mar-2022 21:14:50 EDT GeniusMusing GeniusMusing
    Nasty Linux Netfilter Firewall Security Hole Found Slashdot
    https://linux.slashdot.org/story/22/03/15/221258/nasty-linux-netfilter-firewall-security-hole-found

    >Sophos threat researcher Nick Gregory discovered a hole in Linux's netfilter firewall program that's "exploitable to achieve kernel code execution (via ROP [return-oriented programming]), giving full local privilege escalation, container escape, whatever you want." ZDNet reports:
    >Behind almost all Linux firewalls tools such as iptables; its newer version, nftables; firewalld; and ufw, is netfilter, which controls access to and from Linux's network stack. It's an essential Linux security program, so when a security hole is found in it, it's a big deal. [...] This problem exists because netfilter doesn't handle its hardware offload feature correctly. A local, unprivileged attacker can use this to cause a denial-of-service (DoS), execute arbitrary code, and cause general mayhem. Adding insult to injury, this works even if the hardware being attacked doesn't have offload functionality! That's because, as Gregory wrote to a security list, "Despite being in code dealing with hardware offload, this is reachable when targeting network devices that don't have offload functionality (e.g. lo) as the bug is triggered before the rule creation fails."
    >
    >This vulnerability is present in the Linux kernel versions 5.4 through 5.6.10. It's listed as Common Vulnerabilities and Exposures (CVE-2022-25636), and with a Common Vulnerability Scoring System (CVSS) score of 7.8), this is a real badie. How bad? In its advisory, Red Hat said, "This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat." So, yes, this is bad. Worse still, it affects recent major distribution releases such as Red Hat Enterprise Linux (RHEL) 8.x; Debian Bullseye; Ubuntu Linux, and SUSE Linux Enterprise 15.3. While the Linux kernel netfilter patch has been made, the patch isn't available yet in all distribution releases.

    The Discovery and Exploitation of CVE-2022-25636 ยท Nick Gregory
    https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/

    Guess I'm one of the lucky ones, Tumbleweed is at 5.16.14.

    My servers on the other hand...
    In conversation Tuesday, 15-Mar-2022 21:14:50 EDT from nu.federati.net permalink
    1. lnxw48a1 (lnxw48a1@nu.federati.net)'s status on Tuesday, 15-Mar-2022 21:34:15 EDT lnxw48a1 lnxw48a1
      in reply to
      5.4.0-104-generic here. And no patch yet.
      In conversation Tuesday, 15-Mar-2022 21:34:15 EDT from nu.federati.net permalink
      1. GeniusMusing (geniusmusing@nu.federati.net)'s status on Tuesday, 15-Mar-2022 21:51:10 EDT GeniusMusing GeniusMusing
        in reply to
        Interesting finding with my servers...
        Debian Linux 10: Linux 4.19.0-19-amd64
        Debian Linux 11: Linux 5.10.0-12-amd64
        I guess I'm "safe".
        In conversation Tuesday, 15-Mar-2022 21:51:10 EDT from nu.federati.net permalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.