| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: xtables: avoid NFPROTO_UNSPEC where needed\n\nsyzbot managed to call xt_cluster match via ebtables:\n\n WARNING: CPU: 0 PID: 11 at net/netfilter/xt_cluster.c:72 xt_cluster_mt+0x196/0x780\n [..]\n ebt_do_table+0x174b/0x2a40\n\nModule registers to NFPROTO_UNSPEC, but it assumes ipv4/ipv6 packet\nprocessing. As this is only useful to restrict locally terminating\nTCP/UDP traffic, register this for ipv4 and ipv6 family only.\n\nPablo points out that this is a general issue, direct users of the\nset/getsockopt interface can call into targets/matches that were only\nintended for use with ip(6)tables.\n\nCheck all UNSPEC matches and targets for similar issues:\n\n- matches and targets are fine except if they assume skb_network_header()\n is valid -- this is only true when called from inet layer: ip(6) stack\n pulls the ip/ipv6 header into linear data area.\n- targets that return XT_CONTINUE or other xtables verdicts must be\n restricted too, they are incompatbile with the ebtables traverser, e.g.\n EBT_CONTINUE is a completely different value than XT_CONTINUE.\n\nMost matches/targets are changed to register for NFPROTO_IPV4/IPV6, as\nthey are provided for use by ip(6)tables.\n\nThe MARK target is also used by arptables, so register for NFPROTO_ARP too.\n\nWhile at it, bail out if connbytes fails to enable the corresponding\nconntrack family.\n\nThis change passes the selftests in iptables.git." |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "net/netfilter/xt_CHECKSUM.c", |
| "net/netfilter/xt_CLASSIFY.c", |
| "net/netfilter/xt_CONNSECMARK.c", |
| "net/netfilter/xt_CT.c", |
| "net/netfilter/xt_IDLETIMER.c", |
| "net/netfilter/xt_LED.c", |
| "net/netfilter/xt_NFLOG.c", |
| "net/netfilter/xt_RATEEST.c", |
| "net/netfilter/xt_SECMARK.c", |
| "net/netfilter/xt_TRACE.c", |
| "net/netfilter/xt_addrtype.c", |
| "net/netfilter/xt_cluster.c", |
| "net/netfilter/xt_connbytes.c", |
| "net/netfilter/xt_connlimit.c", |
| "net/netfilter/xt_connmark.c", |
| "net/netfilter/xt_mark.c" |
| ], |
| "versions": [ |
| { |
| "version": "0269ea4937343536ec7e85649932bc8c9686ea78", |
| "lessThan": "85ff9a0f793ca52c527e75cd40a69c948627ebde", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "0269ea4937343536ec7e85649932bc8c9686ea78", |
| "lessThan": "8f482bb7e27b37f1f734bb9a8eeb28b23d59d189", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "0269ea4937343536ec7e85649932bc8c9686ea78", |
| "lessThan": "997f67d813ce0cf5eb3cdb8f124da68141e91b6c", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "0269ea4937343536ec7e85649932bc8c9686ea78", |
| "lessThan": "4cdc55ec6222bb195995cc58f7cb46e4d8907056", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "0269ea4937343536ec7e85649932bc8c9686ea78", |
| "lessThan": "0bfcb7b71e735560077a42847f69597ec7dcc326", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "net/netfilter/xt_CHECKSUM.c", |
| "net/netfilter/xt_CLASSIFY.c", |
| "net/netfilter/xt_CONNSECMARK.c", |
| "net/netfilter/xt_CT.c", |
| "net/netfilter/xt_IDLETIMER.c", |
| "net/netfilter/xt_LED.c", |
| "net/netfilter/xt_NFLOG.c", |
| "net/netfilter/xt_RATEEST.c", |
| "net/netfilter/xt_SECMARK.c", |
| "net/netfilter/xt_TRACE.c", |
| "net/netfilter/xt_addrtype.c", |
| "net/netfilter/xt_cluster.c", |
| "net/netfilter/xt_connbytes.c", |
| "net/netfilter/xt_connlimit.c", |
| "net/netfilter/xt_connmark.c", |
| "net/netfilter/xt_mark.c" |
| ], |
| "versions": [ |
| { |
| "version": "2.6.30", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "2.6.30", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.168", |
| "lessThanOrEqual": "5.15.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1.113", |
| "lessThanOrEqual": "6.1.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.6.57", |
| "lessThanOrEqual": "6.6.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.11.4", |
| "lessThanOrEqual": "6.11.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.12", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.30", |
| "versionEndExcluding": "5.15.168" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.30", |
| "versionEndExcluding": "6.1.113" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.30", |
| "versionEndExcluding": "6.6.57" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.30", |
| "versionEndExcluding": "6.11.4" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.30", |
| "versionEndExcluding": "6.12" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/85ff9a0f793ca52c527e75cd40a69c948627ebde" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/8f482bb7e27b37f1f734bb9a8eeb28b23d59d189" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/997f67d813ce0cf5eb3cdb8f124da68141e91b6c" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/4cdc55ec6222bb195995cc58f7cb46e4d8907056" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/0bfcb7b71e735560077a42847f69597ec7dcc326" |
| } |
| ], |
| "title": "netfilter: xtables: avoid NFPROTO_UNSPEC where needed", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2024-50038", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |