This flaw allows a local user to cause a denial of service or potentially escalate their privileges on the system.Ī use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. That means every iteration overwrites part of the previous element, possibly leading to an out-of-bounds write. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.Ī flaw was found in the Netfilter subsystem in the Linux kernel. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.Ī denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows a local user to crash or potentially escalate their privileges on the system.Ī denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel’s TIPC subsystem. Windows Subsystem for Linux Elevation of Privilege VulnerabilityĪn out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |