A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2061633 | Issue Tracking Patch Third Party Advisory |
https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645 | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220429-0001/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5127 | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5173 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-03-23T05:07:01
Updated: 2022-07-04T10:11:14
Reserved: 2022-03-23T00:00:00
Link: CVE-2022-27666
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-03-23T06:15:06.717
Modified: 2023-02-01T14:32:53.840
Link: CVE-2022-27666
JSON object: View
Redhat Information
No data.
CWE