CVE-2022-2588

MEDIUM

Linux kernel - Use After Free

Title source: llm
STIX 2.1

Description

It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.

Exploits (9)

nomisec WORKING POC 485 stars
by Markakd · poc
https://github.com/Markakd/CVE-2022-2588
nomisec WORKING POC 12 stars
by BassamGraini · poc
https://github.com/BassamGraini/CVE-2022-2588
nomisec WORKING POC 11 stars
by veritas501 · poc
https://github.com/veritas501/CVE-2022-2588
nomisec WRITEUP 10 stars
by nopgadget · poc
https://github.com/nopgadget/CVE-2022-2588
nomisec WORKING POC 7 stars
by pirenga · poc
https://github.com/pirenga/2022-LPE-UAF
nomisec WORKING POC 4 stars
by konoha279 · poc
https://github.com/konoha279/2022-LPE-UAF
nomisec WORKING POC 1 stars
by ASkyeye · poc
https://github.com/ASkyeye/2022-LPE-UAF
nomisec WORKING POC
by Igr1s-red · poc
https://github.com/Igr1s-red/CVE-2022-2588
nomisec WORKING POC
by dom4570 · poc
https://github.com/dom4570/CVE-2022-2588

References (15)

Core 15
Core References
Third Party Advisory third-party-advisory
https://ubuntu.com/security/notices/USN-5565-1
Third Party Advisory third-party-advisory
https://ubuntu.com/security/notices/USN-5562-1
Third Party Advisory third-party-advisory
https://ubuntu.com/security/notices/USN-5582-1
Third Party Advisory third-party-advisory
https://ubuntu.com/security/notices/USN-5564-1
Third Party Advisory third-party-advisory
https://ubuntu.com/security/notices/USN-5566-1
Third Party Advisory, VDB Entry issue-tracking
https://www.zerodayinitiative.com/advisories/ZDI-22-1117/
Third Party Advisory third-party-advisory
https://ubuntu.com/security/notices/USN-5588-1
Third Party Advisory third-party-advisory
https://ubuntu.com/security/notices/USN-5560-1
Third Party Advisory third-party-advisory
https://ubuntu.com/security/notices/USN-5567-1
Third Party Advisory third-party-advisory
https://ubuntu.com/security/notices/USN-5560-2
Mailing List, Patch issue-tracking
https://lore.kernel.org/netdev/[email protected]/T/#u
Third Party Advisory third-party-advisory
https://ubuntu.com/security/notices/USN-5557-1

Scores

CVSS v3 5.3
EPSS 0.5431
EPSS Percentile 98.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-415 CWE-416
Status published
Products (6)
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 20.04
canonical/ubuntu_linux 22.04
linux/linux_kernel < 4.9.326
Published Jan 08, 2024
Tracked Since Feb 18, 2026