ALAS2KERNEL-5.10-2023-041 --- kernelID: oval:org.secpod.oval:def:1701839 | Date: (C)2023-11-24 (M)2024-05-29 |
Class: PATCH | Family: unix |
A flaw was found in rsvp_change. The root cause is an slab-out-of-bound access, but since the offset to the original pointer is an `unsign int` fully controlled by users, the behavior is usually a wild pointer access. A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325
Product: |
kernel |
perf |
python-perf |
bpftool |