First published: Mon Dec 12 2022(Updated: )
A flaw stack overflow in the Linux Kernel found. If user have access to SYSCTL (dynamically changing certain kernel parameters and variables), then can provide incorrect input to the function do_proc_dointvec leading to system crash or potentially privileges escalation. Known example of such incorrect input by local user for the /proc/sys/net/ipv4/tcp_rmem , but it could be other situations when this function being used. References: <a href="https://seclists.org/oss-sec/2022/q4/178">https://seclists.org/oss-sec/2022/q4/178</a> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch">https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch</a> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch">https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=4.9.0<=4.9.337 | |
Linux Linux kernel | >=4.14.0<=4.14.302 | |
Linux Linux kernel | >=4.19.0<=4.19.269 | |
Linux Linux kernel | >=5.4.0<=5.4.228 | |
Linux Linux kernel | >=5.10.0<=5.10.162 | |
Linux Linux kernel | >=5.15.0<=5.15.86 | |
Linux Linux kernel | >=6.0.0<=6.0.11 | |
redhat/kernel | <6.0.12 | 6.0.12 |
IBM Security Guardium | <=11.3 | |
IBM Security Guardium | <=11.4 | |
IBM Security Guardium | <=11.5 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.