Assigner | Linux |
Reserved | 2024-02-19 |
Published | 2024-04-03 |
Updated | 2024-05-29 |
Description
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_mirred: don't override retval if we already lost the skb If we're redirecting the skb, and haven't called tcf_mirred_forward(), yet, we need to tell the core to drop the skb by setting the retcode to SHOT. If we have called tcf_mirred_forward(), however, the skb is out of our hands and returning SHOT will lead to UaF. Move the retval override to the error path which actually need it.
Product status
e5cf1baf92cb before 28cdbbd38a44
e5cf1baf92cb before f4e294bbdca8
e5cf1baf92cb before 166c2c8a6a4d
4.19
Any version before 4.19
6.6.19
6.7.7
6.8
References
https://git.kernel.org/stable/c/28cdbbd38a4413b8eff53399b3f872fd4e80db9d
https://git.kernel.org/stable/c/f4e294bbdca8ac8757db436fc82214f3882fc7e7
https://git.kernel.org/stable/c/166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210