An out-of-bounds read issue was found in the Linux kernel in the nf_osf_match_one() function, which is used for nftables OS fingerprinting. This flaw requires CAP_NET_ADMIN to be exploited and could lead to information disclosure.
Upstream fix: https://github.com/torvalds/linux/commit/f4f8a7803119005e87b716874bec07c751efafec
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2242893]
This was fixed for Fedora with the 6.5.4 stable kernel updates.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2394
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:2950
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3138 https://access.redhat.com/errata/RHSA-2024:3138