A stack based out-of-bounds write was found in the netfilter subsystem in the Linux kernel. If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption.Upstream patch:https://lore.kernel.org/all/20230906162525.11079-2-fw@strlen.de/
A stack based out-of-bounds write was found in the netfilter subsystem in the Linux kernel. If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption.Upstream patch:https://lore.kernel.org/all/20230906162525.11079-2-fw@strlen.de/
A stack based out-of-bounds write was found in the netfilter subsystem in the Linux kernel. If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption.Upstream patch:https://lore.kernel.org/all/20230906162525.11079-2-fw@strlen.de/
A stack based out-of-bounds write was found in the netfilter subsystem in the Linux kernel. If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption.Upstream patch:https://lore.kernel.org/all/20230906162525.11079-2-fw@strlen.de/
A stack based out-of-bounds write was found in the netfilter subsystem in the Linux kernel. If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption.Upstream patch:https://lore.kernel.org/all/20230906162525.11079-2-fw@strlen.de/
A stack based out-of-bounds write was found in the netfilter subsystem in the Linux kernel. If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption.Upstream patch:https://lore.kernel.org/all/20230906162525.11079-2-fw@strlen.de/
A stack based out-of-bounds write was found in the netfilter subsystem in the Linux kernel. If priv->len is a multiple of4,then dst[len / 4] can write past the destination arraywhich leads to stack corruption.Upstream patch:https://lore.kernel.org/all/20230906162525.11079-2-fw@strlen.de/
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression lengthisa multiple of 4 (register size), the `nft_exthdr_eval`family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
Astackbasedout-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
Astack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is amultiple of 4(register size), the `nft_exthdr_eval` family of functions writes 4NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or adenial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length isa multiple of4 (register size), the `nft_exthdr_eval` family of functions writes4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure ora denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
Astack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is amultiple of 4(register size), the `nft_exthdr_eval` family of functions writes 4NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or adenial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length isa multiple of4 (register size), the `nft_exthdr_eval` family of functions writes4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure ora denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
Astack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is amultiple of 4(register size), the `nft_exthdr_eval` family of functions writes 4NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or adenial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length isa multiple of4 (register size), the `nft_exthdr_eval` family of functions writes4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure ora denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
Astack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is amultiple of 4(register size), the `nft_exthdr_eval` family of functions writes 4NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or adenial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length isa multiple of4 (register size), the `nft_exthdr_eval` family of functions writes4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure ora denial of service.
A stack based out-of-bounds write flawwas found in the netfiltersubsysteminthe Linux kernel. Ifthe expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.
Astack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is amultiple of 4(register size), the `nft_exthdr_eval` family of functions writes 4NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or adenial of service.
A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length isa multiple of4 (register size), the `nft_exthdr_eval` family of functions writes4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure ora denial of service.