发布时间: 2023年6月3日
修改时间: 2024年10月31日
An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Local | Network |
CVSS评分 | 6.7 | 9.8 |
Attack Complexity | Low | Low |
Privileges Required | High | None |
Scope | Unchanged | Unchanged |
Integrity | High | High |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1380 | An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12. | 2023年5月30日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | kernel | Fixed |