Описание
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_pipapo: fix null deref for empty set
Blamed commit broke the check for a null scratch map:
- if (unlikely(!m || !*raw_cpu_ptr(m->scratch)))
- if (unlikely(!raw_cpu_ptr(m->scratch)))
This should have been "if (!*raw_ ...)". Use the pattern of the avx2 version which is more readable.
This can only be reproduced if avx2 support isn't available.
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_pipapo: fix null deref for empty set
Blamed commit broke the check for a null scratch map:
- if (unlikely(!m || !*raw_cpu_ptr(m->scratch)))
- if (unlikely(!raw_cpu_ptr(m->scratch)))
This should have been "if (!*raw_ ...)". Use the pattern of the avx2 version which is more readable.
This can only be reproduced if avx2 support isn't available.
CVE ID
Связанные уязвимости
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Уязвимость функции nft_set_pipapo() модуля net/netfilter/nft_set_pipapo.c ядра оперционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании