Updated: 2025-12-14 03:43:57.621151
Description:
In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: exthdr: fix 4-byte stack OOB write If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption. This construct is necessary to clean the remainder of the register in case ->len is NOT a multiple of the register size, so make it conditional just like nft_payload.c does. The bug was added in 4.1 cycle and then copied/inherited when tcp/sctp and ip option support was added. Bug reported by Zero Day Initiative project (ZDI-CAN-21950, ZDI-CAN-21951, ZDI-CAN-21961).
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.1 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 7.1 | HIGH | Released | CLSA-2025:1743193221 | 2024-09-26 12:49:40 | |
| CentOS 6 ELS | kernel | 2.6.32 | 7.1 | HIGH | Not Vulnerable | 2025-09-23 11:29:53 | ||
| CentOS 7 ELS | kernel | 3.10.0 | 7.1 | HIGH | Released | CLSA-2024:1727167500 | 2024-10-03 15:39:19 | |
| CentOS 8.4 ELS | kernel | 4.18.0 | 7.1 | HIGH | Already Fixed | 2025-12-11 07:26:32 | ||
| CentOS 8.5 ELS | kernel | 4.18.0 | 7.1 | HIGH | Released | 2025-12-08 19:09:13 | ||
| CentOS Stream 8 ELS | kernel | 4.18.0 | 7.1 | HIGH | In Testing | 2025-11-12 14:49:09 | ||
| CloudLinux 6 ELS | kernel | 2.6.32 | 7.1 | HIGH | Ignored | 2025-09-23 11:29:52 | Postponed until request or high risk detected | |
| Oracle Linux 6 ELS | kernel | 2.6.32 | 7.1 | HIGH | Not Vulnerable | 2025-11-02 11:42:10 | ||
| RHEL 7 ELS | kernel | 3.10.0 | 7.1 | HIGH | Released | CLSA-2025:1750353839 | 2025-06-20 00:27:47 | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.1 | HIGH | Already Fixed | 2025-04-06 03:44:14 |