net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload. https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/ Fixed in 5.15.26, 5.10.102, 5.4.182. Pablo Neira Ayuso: netfilter: nf_tables_offload: incorrect flow offload action array size Reproducible: Always
kernel@, please stabilize 5.4.182.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1333c8c9a7b6e510a7c5d68b9e77d1864d66b236 commit 1333c8c9a7b6e510a7c5d68b9e77d1864d66b236 Author: Mike Pagano <mpagano@gentoo.org> AuthorDate: 2022-03-26 17:53:54 +0000 Commit: Mike Pagano <mpagano@gentoo.org> CommitDate: 2022-03-26 17:56:23 +0000 sys-kernel/gentoo-sources: Stable 5.4.187 per kernel policy (root exploit) CVE-2022-25636 Bug: https://bugs.gentoo.org/835435 Signed-off-by: Mike Pagano <mpagano@gentoo.org> sys-kernel/gentoo-sources/gentoo-sources-5.4.187.ebuild | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)