nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
Link | Tags |
---|---|
https://marc.info/?l=netfilter-devel&m=165883202007292&w=2 | mailing list third party advisory patch |
https://www.debian.org/security/2022/dsa-5207 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20220901-0007/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html | third party advisory mailing list |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164 |