Bug 2056830 (CVE-2022-25636)
Summary: | CVE-2022-25636 kernel: heap out of bounds write in nf_dup_netdev.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Avinash Hanwate <ahanwate> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | acaringi, adscvr, airlied, alciregi, alex.iribarren, asavkov, berend.de.schouwer, bhu, brdeoliv, bskeggs, chwhite, crwood, ctoe, dhoward, dvlasenk, fhrbata, fpacheco, gerald.prock, hdegoede, hkrzesin, jarod, jarodwilson, jburrell, jeremy, jfaracco, jforbes, jglisse, jlelli, joe.lawrence, jonathan, josef, jpoimboe, jshortt, jstancek, jthierry, jwboyer, jwyatt, kcarcia, kent, kernel-maint, kernel-mgr, kpatch-maint, lgoncalv, linville, lzampier, masami256, mchehab, michal.skrivanek, mperina, nmurray, pdwyer, ptalbert, qzhao, rauferna, rhandlin, rkeshri, rvrbovsk, sbonazzo, scweaver, steved, tsorense, vkumar, walters, williams, ycote, zulinx86 |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-06-03 17:13:51 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2056728, 2056863, 2056864, 2056865, 2056866, 2056867, 2056868, 2056869, 2056870, 2056874, 2056875, 2056879, 2056880, 2056881, 2058737, 2065576, 2068028, 2068029 | ||
Bug Blocks: | 2056832 |
Description
Avinash Hanwate
2022-02-22 07:11:40 UTC
Reference: https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6 https://www.openwall.com/lists/oss-security/2022/02/21/2 Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2056863] This was fixed for Fedora with the 5.16.12 stable kernel updates. Does it matter if netfilter is in use (e.g. -- firewall enabled or disabled)? I cannot find any definitive answer from the mailing list or elsewhere. Created kernel tracking bugs for this issue: Affects: ovirt-4.4 [ bug 2065576 ] This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1413 https://access.redhat.com/errata/RHSA-2022:1413 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1418 https://access.redhat.com/errata/RHSA-2022:1418 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1455 https://access.redhat.com/errata/RHSA-2022:1455 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1535 https://access.redhat.com/errata/RHSA-2022:1535 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1555 https://access.redhat.com/errata/RHSA-2022:1555 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1550 https://access.redhat.com/errata/RHSA-2022:1550 This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2022:4896 https://access.redhat.com/errata/RHSA-2022:4896 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-25636 |