Описание
A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | kernel | Not affected | ||
Red Hat Enterprise Linux 7 | kernel | Not affected | ||
Red Hat Enterprise Linux 7 | kernel-rt | Not affected | ||
Red Hat Enterprise Linux 8 | kernel | Not affected | ||
Red Hat Enterprise Linux 8 | kernel-rt | Not affected | ||
Red Hat Enterprise Linux 9 | kernel | Fixed | RHSA-2023:5069 | 12.09.2023 |
Red Hat Enterprise Linux 9 | kernel-rt | Fixed | RHSA-2023:5091 | 12.09.2023 |
Red Hat Enterprise Linux 9 | kernel | Fixed | RHSA-2023:5069 | 12.09.2023 |
Red Hat Enterprise Linux 9 | kpatch-patch | Fixed | RHSA-2023:5093 | 12.09.2023 |
Red Hat Enterprise Linux 9.0 Extended Update Support | kernel | Fixed | RHSA-2023:7382 | 21.11.2023 |
Показывать по
Дополнительная информация
Статус:
7.8 High
CVSS3
Связанные уязвимости
A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
A use-after-free flaw was found in the Linux kernel\u2019s Netfilter f ...
A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
7.8 High
CVSS3