First published: Fri Dec 08 2023(Updated: )
In nft_dynset_init(), dynset_expr->ops is checked against set->exprs[i]->ops at (0) and set->exprs[i] may be NULL here. if set->num_exprs == 1, which means set->exprs[1] is NULL, and i == 1, the check at (1) will be passed and set->exprs[1] will be accessed, causing a kernel crash. Refer: <a href="https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea">https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2253632 is classified as an important security issue due to potential kernel crashes.
To fix REDHAT-BUG-2253632, ensure you apply the latest kernel updates provided by your Linux distribution.
REDHAT-BUG-2253632 affects systems running the vulnerable versions of the Linux kernel.
REDHAT-BUG-2253632 is a memory access vulnerability that can lead to a kernel crash.
As of now, there is no known public exploit for REDHAT-BUG-2253632, but it is advisable to patch the vulnerability to mitigate risks.