nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
CVE-2022-36946 - High Severity Vulnerability
Vulnerable Library - linuxlinux-4.19.237
The Linux Kernel
Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux
Found in HEAD commit: 10c7b674d65d46240997df9855fe104bdf05229c
Found in base branch: master
Vulnerable Source Files (2)
/net/netfilter/nfnetlink_queue.c /net/netfilter/nfnetlink_queue.c
Vulnerability Details
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
Publish Date: 2022-07-27
URL: CVE-2022-36946
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2022-36946
Release Date: 2022-07-27
Fix Resolution: v4.9.326,v4.14.291,v4.19.255,v5.4.209,v5.10.135,v5.15.59,v5.18.16,v5.19,v5.19
Step up your Open Source Security Game with Mend here