Unrated severityNVD Advisory· Published Feb 22, 2022· Updated Aug 3, 2024
CVE-2022-25636
CVE-2022-25636
Description
net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.
Affected products
60- Linux/Linux kerneldescription
- osv-coords59 versionspkg:rpm/almalinux/kernel-tools-libs-develpkg:rpm/opensuse/dtb-aarch64&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-64kb&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-azure&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-preempt&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-source-azure&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-syms-azure&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-zfcpdump&distro=openSUSE%20Leap%2015.3pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP3pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP3pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_0&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_10&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_11&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_12&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_13&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_15&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_16&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP3pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP3pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP3pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP3pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP3pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3
< 4.18.0-348.23.1.el8_5+ 58 more
- (no CPE)range: < 4.18.0-348.23.1.el8_5
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.38.50.1
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4.150300.18.37.5
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.38.50.1
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.38.50.1
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.38.50.1
- (no CPE)range: < 5.3.18-150300.59.60.4.150300.18.37.5
- (no CPE)range: < 5.3.18-150300.59.60.4.150300.18.37.5
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 13-150200.3.1
- (no CPE)range: < 5-150300.2.1
- (no CPE)range: < 5-150300.2.1
- (no CPE)range: < 4-150300.2.1
- (no CPE)range: < 4-150300.2.1
- (no CPE)range: < 3-150300.2.1
- (no CPE)range: < 2-150300.2.1
- (no CPE)range: < 1-150300.7.5.3
- (no CPE)range: < 11-150300.2.1
- (no CPE)range: < 11-150300.2.1
- (no CPE)range: < 11-150300.2.1
- (no CPE)range: < 10-150300.2.1
- (no CPE)range: < 9-150300.2.1
- (no CPE)range: < 7-150300.2.1
- (no CPE)range: < 7-150300.2.1
- (no CPE)range: < 6-150300.2.1
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.82.1
- (no CPE)range: < 5.3.18-150300.82.1
- (no CPE)range: < 5.3.18-150300.82.1
- (no CPE)range: < 5.3.18-150300.38.50.1
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.82.1
- (no CPE)range: < 5.3.18-150300.38.50.1
- (no CPE)range: < 5.3.18-150300.59.60.4
- (no CPE)range: < 5.3.18-150300.82.1
- (no CPE)range: < 5.3.18-150300.59.60.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.debian.org/security/2022/dsa-5095mitrevendor-advisoryx_refsource_DEBIAN
- packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.htmlmitrex_refsource_MISC
- www.openwall.com/lists/oss-security/2022/02/22/1mitremailing-listx_refsource_MLIST
- git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/mitrex_refsource_MISC
- nickgregory.me/linux/security/2022/03/12/cve-2022-25636/mitrex_refsource_MISC
- security.netapp.com/advisory/ntap-20220325-0002/mitrex_refsource_CONFIRM
- www.openwall.com/lists/oss-security/2022/02/21/2mitrex_refsource_MISC
- www.oracle.com/security-alerts/cpujul2022.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.