Bug 2278930 (CVE-2022-48687) - CVE-2022-48687 kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data.
Summary: CVE-2022-48687 kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data.
Keywords:
Status: NEW
Alias: CVE-2022-48687
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2279002
TreeView+ depends on / blocked
 
Reported: 2024-05-03 18:38 UTC by Marco Benatto
Modified: 2024-10-11 21:07 UTC (History)
49 users (show)

Fixed In Version: kernel 4.14.293, kernel 4.19.258, kernel 5.4.213, kernel 5.10.143, kernel 5.15.68, kernel 5.19.9, kernel 6.0
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:6753 0 None None None 2024-09-18 11:41:06 UTC

Description Marco Benatto 2024-05-03 18:38:41 UTC
In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix out-of-bounds read when setting HMAC data.

The Linux kernel CVE team has assigned CVE-2022-48687 to this issue.

Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024050344-CVE-2022-48687-b82e@gregkh/T

Comment 9 errata-xmlrpc 2024-09-18 11:41:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:6753 https://access.redhat.com/errata/RHSA-2024:6753


Note You need to log in before you can comment on or make changes to this bug.