First published: Wed Apr 03 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_mirred: don't override retval if we already lost the skb If we're redirecting the skb, and haven't called tcf_mirred_forward(), yet, we need to tell the core to drop the skb by setting the retcode to SHOT. If we have called tcf_mirred_forward(), however, the skb is out of our hands and returning SHOT will lead to UaF. Move the retval override to the error path which actually need it.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.6.19 | 6.6.19 |
redhat/kernel | <6.7.7 | 6.7.7 |
redhat/kernel | <6.8 | 6.8 |
Linux Linux kernel | >=4.19<6.6.19 | |
Linux Linux kernel | >=6.7<6.7.7 | |
Linux Linux kernel | =6.8-rc1 | |
Linux Linux kernel | =6.8-rc2 | |
Linux Linux kernel | =6.8-rc3 | |
Linux Linux kernel | =6.8-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.