Description
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
Related CPE's
o
linux
linux_kernel
o
debian
debian_linux
References
https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
https://marc.info/?l=netfilter-devel&m=165883202007292&w=2
https://security.netapp.com/advisory/ntap-20220901-0007/
https://www.debian.org/security/2022/dsa-5207
https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
https://marc.info/?l=netfilter-devel&m=165883202007292&w=2
https://security.netapp.com/advisory/ntap-20220901-0007/
https://www.debian.org/security/2022/dsa-5207
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 · High
Information
Source identifier
Vulnerability status
Modified
Published
2022-07-27T18:15:08.643Z
3 years agoLast modified
2025-05-05T14:15:18.830Z
11 months ago