[SRU Focal, Jammy, Kinetic, Lunar, Mantic, OEM-5.17, OEM-6.0, OEM-6.1 0/1] CVE-2023-35001
Thadeu Lima de Souza Cascardo
cascardo at canonical.com
Thu Jul 6 09:55:46 UTC 2023
- Previous message (by thread): APPLIED [OEM-6.1] Re: [SRU Jammy, Kinetic, Lunar, Mantic, OEM-5.17, OEM-6.0, OEM-6.1 0/1] CVE-2023-31248
- Next message (by thread): [SRU Focal, Jammy, Kinetic, Lunar, Mantic, OEM-5.17, OEM-6.0, OEM-6.1 1/1] netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
[Impact]
An unprivileged user can cause a nft_byteorder expression to read or write
out-of-bounds on the stack. An attacker could use this to cause denial of
service (crash) or achieve code execution.
[Backport]
The fix was applied in the netfilter/nf.git tree and a tag has been pushed.
It is likely to get merged with the same SHA1. The provenance has been added,
but no SAUCE.
[Test case]
A reproducer has been tested.
[Potential regression]
nftables users may regress.
Thadeu Lima de Souza Cascardo (1):
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
net/netfilter/nft_byteorder.c | 14 +++++++-------
1 file changed, 7 insertions(+), 7 deletions(-)
--
2.34.1
- Previous message (by thread): APPLIED [OEM-6.1] Re: [SRU Jammy, Kinetic, Lunar, Mantic, OEM-5.17, OEM-6.0, OEM-6.1 0/1] CVE-2023-31248
- Next message (by thread): [SRU Focal, Jammy, Kinetic, Lunar, Mantic, OEM-5.17, OEM-6.0, OEM-6.1 1/1] netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the kernel-team
mailing list