A use-after-free vulnerability in the Linux kernel’s netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free. We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | linux | <Â 6.1.69-1 | linux_6.1.69-1_all.deb |
Debian | 11 | all | linux | <Â 5.10.205-2 | linux_5.10.205-2_all.deb |
Debian | 10 | all | linux | <Â 4.19.249-2 | linux_4.19.249-2_all.deb |
Debian | 999 | all | linux | <Â 6.6.8-1 | linux_6.6.8-1_all.deb |
Debian | 13 | all | linux | <Â 6.6.8-1 | linux_6.6.8-1_all.deb |
Debian | 10 | all | linux-5.10 | <Â 5.10.205-2~deb10u1 | linux-5.10_5.10.205-2~deb10u1_all.deb |