First published: Tue Jul 06 2021(Updated: )
A flaw was found in the Linux kernel. A null dereference in bond_ipsec_add_sa() may lead to a local denial of service. Upstream commit: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40</a> References: <a href="https://syzkaller.appspot.com/bug?id=160f641886d88bf11cbf1236cc4db994bb210626">https://syzkaller.appspot.com/bug?id=160f641886d88bf11cbf1236cc4db994bb210626</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | ||
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Network Exposure Function | =22.1.1 | |
Oracle Communications Cloud Native Core Policy | =22.2.0 | |
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0286 is a vulnerability in the Linux kernel that may lead to a denial of service attack due to a null pointer dereference in bond_ipsec_add_sa().
CVE-2022-0286 allows a local user to crash the system, resulting in a denial of service.
The severity of CVE-2022-0286 is medium, with a severity value of 5.1.
Linux kernel versions up to and excluding 5.14, kernel-rt version 0:4.18.0-372.9.1.rt7.166.el8, and kernel version 0:4.18.0-372.9.1.el8 are affected by CVE-2022-0286.
To fix CVE-2022-0286, update to Linux kernel version 5.14 or later, kernel-rt version 0:4.18.0-372.9.1.rt7.166.el8 or later, or kernel version 0:4.18.0-372.9.1.el8 or later.