Researcher Uncover Dangerous Linux Netfilter Bug

March 16, 2022

Sophos threat researcher, Nick Gregory has uncovered a bug in Linux Netfilter. The bug allows an attacker to launch DDoS attacks and achieve kernel code execution on compromised devices.

Linux Netfilter is a Linux security program that controls access to and from Linux’s network stack.

The bug tracked as CVE2022-25636 has a 7.8 severity score. It is present in the Linux kernel versions 5.4 to version 5.6.10.

Other affected distribution releases include Red Hat Enterprise Linux (RHEL) 8.x, Debian Bullseye, Ubuntu Linux, and SUSE Linux Enterprise 15.3.

Highlighting how dangerous the bug is, Red Hat explained that the flaw “allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.”

The Linux kernel Netfilter patch is now available. However, the patch isn’t available yet for all distribution releases.

Users who do not have access to the patch yet can use a workaround that involves mitigating the problem in the RHEL family with certain commands.

For more information, read the original story in ZDNet.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn