A double-free flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.
The product does not clean up its state or incorrectly cleans up its state when an exception is thrown, leading to unexpected state or control flow.
The product calls free() twice on the same memory address.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e | vendor advisory |
http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html | third party advisory vdb entry |
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20230526-0009/ | third party advisory |