SB20250226696 - Buffer overflow in Linux kernel netfilter
Published: February 26, 2025 Updated: May 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2022-49110)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the EXPORT_SYMBOL_GPL(), DEFINE_MUTEX(), gc_worker_can_early_drop() and gc_worker() functions in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/2cfadb761d3d0219412fd8150faea60c7e863833
- https://git.kernel.org/stable/c/58d52743ae85d28c9335c6034d6ce350b8689951
- https://git.kernel.org/stable/c/592e57591826f3d09c28d755a39ea8e9d13705ad
- https://git.kernel.org/stable/c/7cd361d5e6d986c0d4cafb9ceaa803359048ae15
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.20