![]() This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.Ī memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This may also result in the disabling of event reporting to ePO, caused by failure to validate input from the file correctly.Ī use-after-free flaw was found in the netfilter subsystem of the Linux kernel. ![]() This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.Ī buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1 allows a local user to gain elevated permissions, or cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root. Windows Subsystem for Linux Elevation of Privilege VulnerabilityĪ vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |