nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
References
Link | Resource |
---|---|
https://marc.info/?l=netfilter-devel&m=165883202007292&w=2 | Mailing List Patch Third Party Advisory |
https://www.debian.org/security/2022/dsa-5207 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220901-0007/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2022-07-27 13:15
Updated : 2022-10-27 07:14
NVD link : CVE-2022-36946
Mitre link : CVE-2022-36946
JSON object : View
CWE
Products Affected
netapp
- hci_compute_node
- solidfire_\&_hci_storage_node
- solidfire_\&_hci_management_node
- active_iq_unified_manager
- solidfire_enterprise_sds
linux
- linux_kernel
debian
- debian_linux