Updated: 2025-03-17 21:37:11.145879
Description:
In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: exthdr: fix 4-byte stack OOB write If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption. This construct is necessary to clean the remainder of the register in case ->len is NOT a multiple of the register size, so make it conditional just like nft_payload.c does. The bug was added in 4.1 cycle and then copied/inherited when tcp/sctp and ip option support was added. Bug reported by Zero Day Initiative project (ZDI-CAN-21950, ZDI-CAN-21951, ZDI-CAN-21961).
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | 0 | |
CVSS Version 3.x | HIGH | 7.1000000000000005 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
AlmaLinux 9.2 ESU | kernel | 5.14.0 | 7.1 | HIGH | Released | CLSA-2025:1743193221 | 2024-09-26 12:49:40 | |
CentOS 6 ELS | kernel | 2.6.32 | 7.1 | HIGH | Ignored | 2024-05-15 14:19:43 | ||
CentOS 7 ELS | kernel | 3.10.0 | 7.1 | HIGH | Released | CLSA-2024:1727167500 | 2024-10-03 15:39:19 | |
CentOS 8.4 ELS | kernel | 4.18.0 | 7.1 | HIGH | Ignored | 2024-05-15 14:19:43 | ||
CentOS 8.5 ELS | kernel | 4.18.0 | 7.1 | HIGH | Ignored | 2024-05-15 14:19:43 | ||
CentOS Stream 8 ELS | kernel | 4.18.0 | 7.1 | HIGH | Ignored | 2024-05-15 14:19:43 | ||
CloudLinux 6 ELS | kernel | 2.6.32 | 7.1 | HIGH | Ignored | 2024-05-15 14:19:43 | ||
Oracle Linux 6 ELS | kernel | 2.6.32 | 7.1 | HIGH | Ignored | 2024-05-15 14:19:43 | ||
RHEL 7 ELS | kernel | 3.10.0 | 7.1 | HIGH | Released | CLSA-2025:1750353839 | 2025-06-20 00:27:47 | |
Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.1 | HIGH | Already Fixed | 2025-04-06 03:44:14 |