First published: Thu Oct 14 2021(Updated: )
A flaw was found in sctp_make_strreset_req in net/sctp/sm_make_chunk.c in SCTP network protocol in the Linux kernel. In this flaw, an attempt to use more buffer than was allocated triggers BUG_ON to cause a denial of service (DOS). References: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.15 | 5.15 |
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
Linux Linux kernel | <5.15 | |
Linux Linux kernel | =5.15 | |
Linux Linux kernel | =5.15-rc1 | |
Linux Linux kernel | =5.15-rc2 | |
Linux Linux kernel | =5.15-rc3 | |
Linux Linux kernel | =5.15-rc4 | |
Linux Linux kernel | =5.15-rc5 | |
Fedoraproject Fedora | =35 | |
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Network Exposure Function | =22.1.1 | |
Oracle Communications Cloud Native Core Policy | =22.2.0 | |
debian/linux | 4.19.249-2 4.19.289-2 5.10.197-1 5.10.191-1 6.1.66-1 6.1.69-1 6.5.13-1 6.6.9-1 |
Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time. ~~~ How do I blacklist a kernel module to prevent it from loading automatically? https://access.redhat.com/solutions/41278 ~~~
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0322 is a vulnerability in the SCTP network protocol in the Linux kernel that can be exploited by a local user to cause a denial of service (DOS) attack.
The severity of CVE-2022-0322 is medium, with a CVSS score of 5.5.
The Linux kernel versions up to 5.15, Fedora 35, Oracle Communications Cloud Native Core Binding Support Function 22.1.3, Oracle Communications Cloud Native Core Network Exposure Function 22.1.1, and Oracle Communications Cloud Native Core Policy 22.2.0 are affected by CVE-2022-0322.
CVE-2022-0322 can be exploited by a local user with privilege access to trigger a BUG_ON issue by attempting to use more buffer than is allocated, leading to a denial of service (DOS).
You can find more information about CVE-2022-0322 in the following references: [1] [2] [3].