A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.
{
"versions": [
{
"introduced": "0"
},
{
"fixed": "5.17"
},
{
"introduced": "0"
},
{
"last_affected": "5.17-NA"
},
{
"introduced": "0"
},
{
"last_affected": "5.17-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "5.17-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "5.17-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "5.17-rc4"
},
{
"introduced": "0"
},
{
"last_affected": "5.17-rc5"
},
{
"introduced": "0"
},
{
"last_affected": "5.17-rc6"
},
{
"introduced": "0"
},
{
"last_affected": "5.17-rc7"
},
{
"introduced": "0"
},
{
"last_affected": "4.0"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-27666.json"
[
{
"signature_type": "Line",
"source": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"id": "CVE-2022-27666-1343edaa",
"deprecated": false,
"target": {
"file": "net/ipv4/esp4.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"26503852986355777983877676627942206522",
"95565642309597240474196705954084476399",
"94760435749426110387834127243209532942",
"7881965634089340344198128383572261703",
"169356827460306123450178874156226372685",
"107685004130796312217457407723659002598",
"123644005694334879920095728060934537055"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"source": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"id": "CVE-2022-27666-52af67eb",
"deprecated": false,
"target": {
"function": "esp6_output_head",
"file": "net/ipv6/esp6.c"
},
"signature_version": "v1",
"digest": {
"length": 1646.0,
"function_hash": "166601955586702264130932916711517024104"
}
},
{
"signature_type": "Function",
"source": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"id": "CVE-2022-27666-81227c18",
"deprecated": false,
"target": {
"function": "esp_output_head",
"file": "net/ipv4/esp4.c"
},
"signature_version": "v1",
"digest": {
"length": 1646.0,
"function_hash": "166601955586702264130932916711517024104"
}
},
{
"signature_type": "Line",
"source": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"id": "CVE-2022-27666-b0fec9d7",
"deprecated": false,
"target": {
"file": "net/ipv6/esp6.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"26503852986355777983877676627942206522",
"95565642309597240474196705954084476399",
"127106908932868289674113965391921642206",
"104377733366796494046942538569753325098",
"169356827460306123450178874156226372685",
"107685004130796312217457407723659002598",
"123644005694334879920095728060934537055"
],
"threshold": 0.9
}
}
]
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "34"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "35"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.0"
}
]
}
]