Updated: 2025-11-19 04:53:32.282878
Description:
In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | MEDIUM | 5.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 5.5 | MEDIUM | Ignored | 2025-01-10 22:39:21 | This flaw is only reachable via the conntrack expectation netlink interface (ctnetlink) by a local u... | |
| Oracle Linux 7 ELS | kernel-uek | 5.4.17 | 5.5 | MEDIUM | Ignored | 2025-12-04 17:10:22 | Deprioritize: exploitation requires local access to the ctnetlink expectation-deletion path, which i... | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 5.5 | MEDIUM | Released | CLSA-2025:1736444557 | 2025-01-10 00:54:41 | |
| Ubuntu 16.04 ELS | linux | 4.4.0 | 5.5 | MEDIUM | Released | CLSA-2025:1736470237 | 2025-01-12 02:38:29 | |
| Ubuntu 18.04 ELS | linux | 4.15.0 | 5.5 | MEDIUM | Released | CLSA-2025:1736469006 | 2025-01-12 02:38:31 |