nfqnlmangle in net/netfilter/nfnetlinkqueue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nfqueue verdict with a one-byte nftapayload attribute, an skb_pull can encounter a negative skb->len.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36946.json"
[
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164",
"target": {
"file": "net/netfilter/nfnetlink_queue.c",
"function": "nfqnl_mangle"
},
"id": "CVE-2022-36946-2fd8359a",
"digest": {
"length": 649.0,
"function_hash": "144445632836644972413584505526966968007"
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164",
"target": {
"file": "net/netfilter/nfnetlink_queue.c"
},
"id": "CVE-2022-36946-8349e58c",
"digest": {
"threshold": 0.9,
"line_hashes": [
"270009790484942666499120461684726477963",
"262217315499022248991872001546974917923",
"80189833105036550409830355555088370861",
"244492332659043382056869449867394457980",
"166507520071611733102504662712420579452",
"322220573573797577656197605755997798009",
"301643604862257315666600968246752453548"
]
},
"signature_type": "Line",
"signature_version": "v1"
}
]