-
Notifications
You must be signed in to change notification settings - Fork 5.2k
CVE-2022-32250 Linux Kernel privilege escalation vulnerability, a use-after-free bug - unclear situation #5172
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Dear pelwell, Sounds good, but I'm wondering that the tests (of course out from another forum) looks like Raspios Kernel 5.15.65 it's still vulnerable, because same tests on patched Ubuntu or Debian systems show other outputs. Do you know another cli test to check if a raspios system is truly safe against CVE-2022-32250? |
I think your test is flawed. For me:
|
Dear kralo, It seems you are German speaking. It was discussed first at the heise Forum here: What I know is, that on some other systems the unshare "Test" didn't work anymore after the kernel was patched. I only want to be sure that Raspios with Kernel 5.15.x is safe, because I do not find anything about this security flaw directly belonging to Raspios before. |
Reading the link you posted, changing into the namespace is a prerequisite to trigger the bug, not the bug.
Did you specifically check this before and after? Because some distributions will limit kernel capabilities via settings, and thus the prerequisite to trigger the bug does disappear. |
I think yes that I try before and after patch, but 3 month ago, I can't swear an oath on it. ;-) I don't want to make a POC. After pelwell's and your statement, I would trust, that the actual RaspiOS Kernel 5.15.x is safe. So my little system can go back online. |
I just figured out, that my Test System (Raspi 2) was bumped by me via rpi-update to Kernel 5.15.65 in between watching incoming updates. It seems, that the oldstable RaspiOS (Buster) get no Kernel Update to 5.15 or a newer patched 5.10 within the standard apt dist-upgrade procedure. My Raspi 1 is still at Buster and Raspi 2 within the last 3 month updated to Bullseye. But before I reopen my question to Kernel 5.10 I will use also rpi-update to go to 5.15 line at this system too. |
Uh oh!
There was an error while loading. Please reload this page.
Describe the bug
Dear Raspi Team,
since June I'm waiting of a patch for CVE-2022-32250
Linux Kernel privilege escalation vulnerability, a use-after-free bug that was found in the Linux kernel’s net/netfilter/nf_tables_api.c.
It looks like that isn't patched yet.
In stock Debian this flaw is patched long time ago, of course for Kernel 5.10 an 5.18,
https://security-tracker.debian.org/tracker/CVE-2022-32250
but RaspiOS uses Kernel 5.15?
One of my four Raspis is normally online with ssh access for external users. Because of this security flaw it must going offline for three month until now.
A fix or reply with a clarification would be nice.
See more information about it:
https://securityonline.info/cve-2022-32250-linux-kernel-privilege-escalation-vulnerability/
Best Regards
Macomaniac
Steps to reproduce the behaviour
as normal user pi
unshare -Unr /bin/bash
looks to get a root shell
and as root
capsh --decode=$(grep CapEff /proc/self/status | cut -f2)
0x0000000000000000=
list still the vulnarable cap_net_admin right.
I try also the latest kernel via rpi-update with no difference (see below under system).
Device (s)
Raspberry Pi 2 Mod. B
System
Generated using pi-gen, https://github.com/RPi-Distro/pi-gen, 80d486687ea77d31fc3fc13cf3a2f8b464e129be, stage5
Aug 26 2022 14:04:36
Copyright (c) 2012 Broadcom
version 102f1e848393c2112206fadffaaf86db04e98326 (clean) (release) (start)
Linux Raspi-2 5.15.65-v7+ #1583 SMP Wed Sep 7 15:40:11 BST 2022 armv7l GNU/Linux
Logs
No response
Additional context
Davin from the Raspberrypi forum said I should open an issue here on github.
The text was updated successfully, but these errors were encountered: