atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Link | Tags |
---|---|
https://www.openwall.com/lists/oss-security/2023/01/10/1 | third party advisory mailing list |
https://www.openwall.com/lists/oss-security/2023/01/10/4 | third party advisory mailing list |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b | patch vendor advisory |
https://www.debian.org/security/2023/dsa-5324 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html | mailing list |
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html | mailing list |