APPLIED[U]: [SRU Jammy, Kinetic, Lunar, Mantic, OEM-5.17, OEM-6.0, OEM-6.1 0/1] CVE-2023-31248
Andrea Righi
andrea.righi at canonical.com
Mon Jul 10 07:06:21 UTC 2023
- Previous message (by thread): APPLIED[L/J, HWE-5.19]/Cmnt: [SRU Jammy, Kinetic, Lunar, Mantic, OEM-5.17, OEM-6.0, OEM-6.1 0/1] CVE-2023-31248
- Next message (by thread): APPLIED [OEM-5.17/OEM-6.0]: [SRU Jammy, Kinetic, Lunar, Mantic, OEM-5.17, OEM-6.0, OEM-6.1 0/1] CVE-2023-31248
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
On Thu, Jul 06, 2023 at 06:49:24AM -0300, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> An unprivileged user can trigger a use-after-free on a chain when adding a
> rule by using CHAIN_ID. An attacker could use this to cause denial of
> service (crash) or achieve code execution.
>
> [Backport]
> The fix was applied in the netfilter/nf.git tree and a tag has been pushed.
> It is likely to get merged with the same SHA1. The provenance has been added,
> but no SAUCE.
>
> [Test case]
> A reproducer has been tested.
>
> [Potential regression]
> nftables users may regress.
Applied to mantic/linux-unstable.
Thanks,
-Andrea
- Previous message (by thread): APPLIED[L/J, HWE-5.19]/Cmnt: [SRU Jammy, Kinetic, Lunar, Mantic, OEM-5.17, OEM-6.0, OEM-6.1 0/1] CVE-2023-31248
- Next message (by thread): APPLIED [OEM-5.17/OEM-6.0]: [SRU Jammy, Kinetic, Lunar, Mantic, OEM-5.17, OEM-6.0, OEM-6.1 0/1] CVE-2023-31248
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the kernel-team
mailing list