A use-after-free vulnerability was discovered within the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This causes a use-after-free on an NFT_CHAIN object or NFT_OBJECT object. A local unprivileged user could use this vulnerability to escalate their privileges on the system.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2256447]
Upstream patch (Netfilter tree): https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a
This was fixed for Fedora with the 6.6.10 stable kernel updates.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:1019 https://access.redhat.com/errata/RHSA-2024:1019
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:1018 https://access.redhat.com/errata/RHSA-2024:1018
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:1248 https://access.redhat.com/errata/RHSA-2024:1248
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:4412 https://access.redhat.com/errata/RHSA-2024:4412
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:4415 https://access.redhat.com/errata/RHSA-2024:4415