Arch Linux

Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#75226 - [linux linux-lts linux-hardened linux-zen] Potential LPE due to heap overflow in nft_set_elem_init()

Attached to Project: Arch Linux
Opened by Pascal Ernster (hardfalcon) - Sunday, 03 July 2022, 20:04 GMT
Last edited by Levente Polyak (anthraxx) - Friday, 08 July 2022, 20:21 GMT
Task Type Bug Report
Category Security
Status Assigned
Assigned To Andreas Radke (AndyRTR)
Jan Alexander Steffens (heftig)
David Runge (dvzrv)
Levente Polyak (anthraxx)
Architecture All
Severity High
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 0%
Votes 0
Private No

Details

The Linux kernel since at least version 5.8 is reported to be vulnerable to an LPE vulnerability due to a heap overflow in the nft_set_elem_init() function in /net/netfilter/nf_tables_api.c:

cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/"> https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/


Here's the relevant thread on the netdev list:
https://lists.openwall.net/netdev/2022/07/02/86


And here's the patchset that will hopefully fix the issue:
https://lists.openwall.net/netdev/2022/07/02/116

20220702191029.238563-1-pablo@netfilter.org/"> https://patchwork.ozlabs.org/project/netfilter-devel/patch/20220702191029.238563-1-pablo@netfilter.org/
20220702191029.238563-2-pablo@netfilter.org/"> https://patchwork.ozlabs.org/project/netfilter-devel/patch/20220702191029.238563-2-pablo@netfilter.org/
20220702191029.238563-3-pablo@netfilter.org/"> https://patchwork.ozlabs.org/project/netfilter-devel/patch/20220702191029.238563-3-pablo@netfilter.org/


A CVE has been requested but not assigned yet AFAICT.
This task depends upon

Comment by Pascal Ernster (hardfalcon) - Sunday, 03 July 2022, 20:07 GMT Comment by Pascal Ernster (hardfalcon) - Tuesday, 05 July 2022, 10:19 GMT
This has been assigned CVE-2022-34918 by MITRE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
Comment by Pascal Ernster (hardfalcon) - Friday, 08 July 2022, 16:12 GMT Comment by Levente Polyak (anthraxx) - Friday, 08 July 2022, 20:34 GMT
implemented upstream in hardened 5.18.10-hardened1 release
Comment by Andreas Radke (AndyRTR) - Saturday, 09 July 2022, 16:05 GMT
Fixed in linux-lts-5.15.53-2.

Loading...