nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
References
Link | Resource |
---|---|
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164 | |
https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html | Mailing List Third Party Advisory |
https://marc.info/?l=netfilter-devel&m=165883202007292&w=2 | Mailing List Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220901-0007/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5207 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2022-07-27 20:15
Updated : 2024-03-25 01:15
NVD link : CVE-2022-36946
Mitre link : CVE-2022-36946
CVE.ORG link : CVE-2022-36946
JSON object : View
Products Affected
netapp
- hci_compute_node
- solidfire_enterprise_sds
- solidfire_\&_hci_storage_node
- active_iq_unified_manager
- solidfire_\&_hci_management_node
linux
- linux_kernel
debian
- debian_linux
CWE