First published: Wed Jan 10 2024(Updated: )
Lonial Con discovered that the netfilter subsystem in the Linux kernel did not properly handle an expired catchall element in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-6.1.0-1028-oem | <6.1.0-1028.28 | 6.1.0-1028.28 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-oem-22.04 | <6.1.0.1028.29 | 6.1.0.1028.29 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-oem-22.04a | <6.1.0.1028.29 | 6.1.0.1028.29 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-oem-22.04c | <6.1.0.1028.29 | 6.1.0.1028.29 |
Ubuntu Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.