Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-jr8j-2jhp-m67v: nftables binding to an already bound chain

Impact

An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel. A denial of service can occur upon binding to an already bound chain.

Affected by this vulnerability is the function nft_verdict_init of the file net/netfilter/nf_tables_api.c. The manipulation with an unknown input leads to a denial of service vulnerability. The program does not release or incorrectly releases a resource before it is made available for re-use.

Patches

The fix has been backported to 5.15.64 version of the upstream Linux kernel (5.15 is the upstream Kernel long term version Talos ships with). Talos >= v1.2.0 is shipped with Linux Kernel 5.15.64 fixing the above issue.

Workarounds

It’s recommended to upgrade

References

  • https://www.sesin.at/2022/09/02/cve-2022-39190-linux-kernel-up-to-5-19-5-nf_tables_api-c-nft_verdict_init-denial-of-service/
  • https://nvd.nist.gov/vuln/detail/CVE-2022-39190

For more information

ghsa
#vulnerability#linux#dos#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-jr8j-2jhp-m67v

nftables binding to an already bound chain

Moderate severity GitHub Reviewed Published Sep 16, 2022 in siderolabs/talos

Vulnerability details Dependabot alerts 0

Package

gomod github.com/siderolabs/talos (Go)

Affected versions

< 1.2.0

Patched versions

1.2.0

Description

Impact

An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel. A denial of service can occur upon binding to an already bound chain.

Affected by this vulnerability is the function nft_verdict_init of the file net/netfilter/nf_tables_api.c. The manipulation with an unknown input leads to a denial of service vulnerability. The program does not release or incorrectly releases a resource before it is made available for re-use.

Patches

The fix has been backported to 5.15.64 version of the upstream Linux kernel (5.15 is the upstream Kernel long term version Talos ships with). Talos >= v1.2.0 is shipped with Linux Kernel 5.15.64 fixing the above issue.

Workarounds

It’s recommended to upgrade

References

  • https://www.sesin.at/2022/09/02/cve-2022-39190-linux-kernel-up-to-5-19-5-nf_tables_api-c-nft_verdict_init-denial-of-service/
  • https://nvd.nist.gov/vuln/detail/CVE-2022-39190

For more information

References

  • GHSA-jr8j-2jhp-m67v

frezbo published the maintainer security advisory

Sep 8, 2022

Severity

Moderate

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-jr8j-2jhp-m67v

Source code

siderolabs/talos

Checking history

See something to contribute? Suggest improvements for this vulnerability.

ghsa: Latest News

GHSA-pj33-75x5-32j4: RabbitMQ HTTP API's queue deletion endpoint does not verify that the user has a required permission