We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: Initialize ctx to avoid memory allocation error It is possible that ctx in nfqnl_build_packet_message() could be used before it is properly initialize, which is only initialized by nfqnl_get_sk_secctx(). This patch corrects this problem by initializing the lsmctx to a safe value when it is declared. This is similar to the commit 35fcac7a7c25 ("audit: Initialize lsmctx to avoid memory allocation error").
Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-04-16 | Assigner Linuxgit.kernel.org/...c/ddbf7e1d82a1d0c1d3425931a6cb1b83f8454759
git.kernel.org/...c/778b09d91baafb13408470c721d034d6515cfa5a
Support options