APPLIED[L/J/F, HWE-5.19]/Cmnt: [SRU Focal, Jammy, Kinetic, Lunar, Mantic, OEM-5.17, OEM-6.0, OEM-6.1 0/1] CVE-2023-35001

Stefan Bader stefan.bader at
Fri Jul 7 10:10:25 UTC 2023

On 06.07.23 11:55, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> An unprivileged user can cause a nft_byteorder expression to read or write
> out-of-bounds on the stack. An attacker could use this to cause denial of
> service (crash) or achieve code execution.
> [Backport]
> The fix was applied in the netfilter/nf.git tree and a tag has been pushed.
> It is likely to get merged with the same SHA1. The provenance has been added,
> but no SAUCE.
> [Test case]
> A reproducer has been tested.
> [Potential regression]
> nftables users may regress.
> Thadeu Lima de Souza Cascardo (1):
>    netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
>   net/netfilter/nft_byteorder.c | 14 +++++++-------
>   1 file changed, 7 insertions(+), 7 deletions(-)

Applied to lunar,jammy,focal:linux/master-next and 
jammy:linux-hwe-5.19/hwe-5.19-next (Kinetic EOL). Updated cherry-pick to 
point to linux-next. Thanks.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 44613 bytes
Desc: OpenPGP public key
URL: <>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <>

More information about the kernel-team mailing list