kernel is vulnerable to Denial Of Service (DoS). The vulnerability exists in the nft_set_desc_concat_parse()
function in the library, allowing an attacker to cause an application crash through the buffer overflow by providing a malicious input.
access.redhat.com/errata/RHSA-2022:6610
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=2096178
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85
www.debian.org/security/2022/dsa-5161