CVE-2022-2588

It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.
References
Link Resource
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588 Third Party Advisory
https://github.com/Markakd/CVE-2022-2588 Exploit
https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u Mailing List Patch
https://ubuntu.com/security/notices/USN-5557-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5560-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5560-2 Third Party Advisory
https://ubuntu.com/security/notices/USN-5562-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5564-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5565-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5566-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5567-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5582-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5588-1 Third Party Advisory
https://www.openwall.com/lists/oss-security/2022/08/09/6 Mailing List
https://www.zerodayinitiative.com/advisories/ZDI-22-1117/ Third Party Advisory VDB Entry
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588 Third Party Advisory
https://github.com/Markakd/CVE-2022-2588 Exploit
https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u Mailing List Patch
https://ubuntu.com/security/notices/USN-5557-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5560-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5560-2 Third Party Advisory
https://ubuntu.com/security/notices/USN-5562-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5564-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5565-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5566-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5567-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5582-1 Third Party Advisory
https://ubuntu.com/security/notices/USN-5588-1 Third Party Advisory
https://www.openwall.com/lists/oss-security/2022/08/09/6 Mailing List
https://www.zerodayinitiative.com/advisories/ZDI-22-1117/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 07:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 5.3
References () https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588 - Third Party Advisory () https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588 - Third Party Advisory
References () https://github.com/Markakd/CVE-2022-2588 - Exploit () https://github.com/Markakd/CVE-2022-2588 - Exploit
References () https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u - Mailing List, Patch () https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u - Mailing List, Patch
References () https://ubuntu.com/security/notices/USN-5557-1 - Third Party Advisory () https://ubuntu.com/security/notices/USN-5557-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5560-1 - Third Party Advisory () https://ubuntu.com/security/notices/USN-5560-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5560-2 - Third Party Advisory () https://ubuntu.com/security/notices/USN-5560-2 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5562-1 - Third Party Advisory () https://ubuntu.com/security/notices/USN-5562-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5564-1 - Third Party Advisory () https://ubuntu.com/security/notices/USN-5564-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5565-1 - Third Party Advisory () https://ubuntu.com/security/notices/USN-5565-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5566-1 - Third Party Advisory () https://ubuntu.com/security/notices/USN-5566-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5567-1 - Third Party Advisory () https://ubuntu.com/security/notices/USN-5567-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5582-1 - Third Party Advisory () https://ubuntu.com/security/notices/USN-5582-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5588-1 - Third Party Advisory () https://ubuntu.com/security/notices/USN-5588-1 - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2022/08/09/6 - Mailing List () https://www.openwall.com/lists/oss-security/2022/08/09/6 - Mailing List
References () https://www.zerodayinitiative.com/advisories/ZDI-22-1117/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-22-1117/ - Third Party Advisory, VDB Entry

12 Jan 2024, 16:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 7.8
References () https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588 - () https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588 - Third Party Advisory
References () https://github.com/Markakd/CVE-2022-2588 - () https://github.com/Markakd/CVE-2022-2588 - Exploit
References () https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u - () https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u - Mailing List, Patch
References () https://ubuntu.com/security/notices/USN-5557-1 - () https://ubuntu.com/security/notices/USN-5557-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5560-1 - () https://ubuntu.com/security/notices/USN-5560-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5560-2 - () https://ubuntu.com/security/notices/USN-5560-2 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5562-1 - () https://ubuntu.com/security/notices/USN-5562-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5564-1 - () https://ubuntu.com/security/notices/USN-5564-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5565-1 - () https://ubuntu.com/security/notices/USN-5565-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5566-1 - () https://ubuntu.com/security/notices/USN-5566-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5567-1 - () https://ubuntu.com/security/notices/USN-5567-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5582-1 - () https://ubuntu.com/security/notices/USN-5582-1 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-5588-1 - () https://ubuntu.com/security/notices/USN-5588-1 - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2022/08/09/6 - () https://www.openwall.com/lists/oss-security/2022/08/09/6 - Mailing List
References () https://www.zerodayinitiative.com/advisories/ZDI-22-1117/ - () https://www.zerodayinitiative.com/advisories/ZDI-22-1117/ - Third Party Advisory, VDB Entry
CPE cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-415
Summary
  • (es) Se descubrió que la implementación del filtro cls_route en el kernel de Linux no eliminaba un filtro antiguo de la tabla hash antes de liberarlo si su identificador tenía el valor 0.
First Time Canonical
Linux
Canonical ubuntu Linux
Linux linux Kernel

08 Jan 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-08 18:15

Updated : 2024-11-21 07:01


NVD link : CVE-2022-2588

Mitre link : CVE-2022-2588

CVE.ORG link : CVE-2022-2588


JSON object : View

Products Affected

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-416

Use After Free

CWE-415

Double Free