First published: Fri Jul 12 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_inner: validate mandatory meta and payload Check for mandatory netlink attributes in payload and meta expression when used embedded from the inner expression, otherwise NULL pointer dereference is possible from userspace.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=6.2<6.6.35 | |
Linux Linux kernel | >=6.7<6.9.6 | |
Linux Linux kernel | =6.10-rc1 | |
Linux Linux kernel | =6.10-rc2 | |
Linux Linux kernel | =6.10-rc3 | |
redhat/kernel | <6.6.35 | 6.6.35 |
redhat/kernel | <6.9.6 | 6.9.6 |
redhat/kernel | <6.10 | 6.10 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.