摘要:
In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_queue: fix possible use-after-freeEric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0.On failure, we cannot queue the packet and need to indicate anerror. The packet will be dropped by the caller.v2: split skb prefetch hunk into separate change
安全等级: Low
公告ID: KylinSec-SA-2024-3616
发布日期: 2024年9月3日
关联CVE: CVE-2022-48911
In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_queue: fix possible use-after-freeEric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0.On failure, we cannot queue the packet and need to indicate anerror. The packet will be dropped by the caller.v2: split skb prefetch hunk into separate change
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-48911 | KY3.4-5 | kernel | Unaffected |
CVE-2022-48911 | KY3.5.3 | kernel | Unaffected |
CVE-2022-48911 | V6 | kernel | Unaffected |