In the Linux kernel, the following vulnerability has been resolved: nf_tables: nft_dynset: fix possible stateful expression memleak in error path If cloning the second stateful expression in the element via GFP_ATOMIC fails, then the first stateful expression remains in place without being released. unreferenced object (percpu) 0x607b97e9cab8 (size 16): comm "softirq", pid 0, jiffies 4294931867 hex dump (first 16 bytes on cpu 3): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 backtrace (crc 0): pcpu_alloc_noprof+0x453/0xd80 nft_counter_clone+0x9c/0x190 [nf_tables] nft_expr_clone+0x8f/0x1b0 [nf_tables] nft_dynset_new+0x2cb/0x5f0 [nf_tables] nft_rhash_update+0x236/0x11c0 [nf_tables] nft_dynset_eval+0x11f/0x670 [nf_tables] nft_do_chain+0x253/0x1700 [nf_tables] nft_do_chain_ipv4+0x18d/0x270 [nf_tables] nf_hook_slow+0xaa/0x1e0 ip_local_deliver+0x209/0x330
| Vendor | Product | Versions |
|---|---|---|
| linux | linux kernel | 563125a73ac30d7036ae69ca35c40500562c1de4, 563125a73ac30d7036ae69ca35c40500562c1de4, 563125a73ac30d7036ae69ca35c40500562c1de4, 563125a73ac30d7036ae69ca35c40500562c1de4, 5.11, 6.12.77, 6.18.19, 6.19.9, 7.0-rc4 |
Updated affected versions to include 6.12.77, 6.18.19, 6.19.9, and 7.0-rc4, and changed severity to CRITICAL.
Initial creation