nfqnlmangle in net/netfilter/nfnetlinkqueue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nfqueue verdict with a one-byte nftapayload attribute, an skb_pull can encounter a negative skb->len.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "11.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "2.6.14"
},
{
"fixed": "4.9.326"
},
{
"introduced": "4.10"
},
{
"fixed": "4.14.291"
},
{
"introduced": "4.15"
},
{
"fixed": "4.19.255"
},
{
"introduced": "4.20"
},
{
"fixed": "5.4.209"
},
{
"introduced": "5.5"
},
{
"fixed": "5.10.135"
},
{
"introduced": "5.11"
},
{
"fixed": "5.15.59"
},
{
"introduced": "5.16"
},
{
"fixed": "5.18.16"
}
],
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"fixed": "5.18.14"
}
],
"source": "DESCRIPTION"
}
]
}