Impact
This vulnerability occurs in the Linux kernel’s netfilter x_tables subsystem when rule names are not guaranteed to be null‑terminated before being passed to functions that expect proper C strings. The missing null byte allows a name to extend beyond its intended buffer, causing kernel string handling functions to read or write past the buffer boundary. Such a memory corruption can overwrite critical kernel data structures, potentially enabling an attacker to gain elevated privileges or crash the system.
Affected Systems
All kernel releases that contain the unpatched netfilter x_tables code are affected. The change was applied in the latest kernel commit identified by the fix tag, but specific upstream versions are not enumerated in the advisory. Therefore any Linux kernel version prior to the most recent official kernel release that includes the null‑termination check is vulnerable.
Risk and Exploitability
Because the CVSS score of 5.5 and the EPSS score is unavailable, the likelihood of exploitation is uncertain. The likely attack vector is through a crafted netfilter rule name supplied by a local user or via an exposed interface that allows arbitrary rule names. The nature of the flaw – kernel memory corruption through improperly terminated strings – could enable privilege escalation or a crash if such a rule name overflows into critical kernel data structures. The risk profile is medium to high for systems where untrusted users can create netfilter rules or where network interfaces are exposed to untrusted traffic that can influence rule names.
OpenCVE Enrichment
Debian DLA
Debian DSA