An out-of-bounds read issue was found in the Linux kernel in the match_flags() function, which belongs to the Xtables SCTP protocol packet matching. This flaw requires CAP_NET_ADMIN to be exploited and could lead to information disclosure.
ZDI security advisory: https://www.zerodayinitiative.com/advisories/ZDI-CAN-18866/ Upstream fix: https://github.com/torvalds/linux/commit/e99476497687ef9e850748fe6d232264f30bc8f9
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2242879]
This was fixed for Fedora with the 6.5.3 stable kernels
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2394
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:2950
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3138 https://access.redhat.com/errata/RHSA-2024:3138