cve-2024-50038
Vulnerability from cvelistv5
Published
2024-10-21 19:39
Modified
2024-12-19 09:31
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: netfilter: xtables: avoid NFPROTO_UNSPEC where needed syzbot managed to call xt_cluster match via ebtables: WARNING: CPU: 0 PID: 11 at net/netfilter/xt_cluster.c:72 xt_cluster_mt+0x196/0x780 [..] ebt_do_table+0x174b/0x2a40 Module registers to NFPROTO_UNSPEC, but it assumes ipv4/ipv6 packet processing. As this is only useful to restrict locally terminating TCP/UDP traffic, register this for ipv4 and ipv6 family only. Pablo points out that this is a general issue, direct users of the set/getsockopt interface can call into targets/matches that were only intended for use with ip(6)tables. Check all UNSPEC matches and targets for similar issues: - matches and targets are fine except if they assume skb_network_header() is valid -- this is only true when called from inet layer: ip(6) stack pulls the ip/ipv6 header into linear data area. - targets that return XT_CONTINUE or other xtables verdicts must be restricted too, they are incompatbile with the ebtables traverser, e.g. EBT_CONTINUE is a completely different value than XT_CONTINUE. Most matches/targets are changed to register for NFPROTO_IPV4/IPV6, as they are provided for use by ip(6)tables. The MARK target is also used by arptables, so register for NFPROTO_ARP too. While at it, bail out if connbytes fails to enable the corresponding conntrack family. This change passes the selftests in iptables.git.
Impacted products
Vendor Product Version
Linux Linux Version: 0269ea4937343536ec7e85649932bc8c9686ea78
Version: 0269ea4937343536ec7e85649932bc8c9686ea78
Version: 0269ea4937343536ec7e85649932bc8c9686ea78
Version: 0269ea4937343536ec7e85649932bc8c9686ea78
Version: 0269ea4937343536ec7e85649932bc8c9686ea78
Create a notification for this product.
   Linux Linux Version: 2.6.30
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-50038",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-22T13:25:10.359959Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-22T13:28:44.637Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "net/netfilter/xt_CHECKSUM.c",
                  "net/netfilter/xt_CLASSIFY.c",
                  "net/netfilter/xt_CONNSECMARK.c",
                  "net/netfilter/xt_CT.c",
                  "net/netfilter/xt_IDLETIMER.c",
                  "net/netfilter/xt_LED.c",
                  "net/netfilter/xt_NFLOG.c",
                  "net/netfilter/xt_RATEEST.c",
                  "net/netfilter/xt_SECMARK.c",
                  "net/netfilter/xt_TRACE.c",
                  "net/netfilter/xt_addrtype.c",
                  "net/netfilter/xt_cluster.c",
                  "net/netfilter/xt_connbytes.c",
                  "net/netfilter/xt_connlimit.c",
                  "net/netfilter/xt_connmark.c",
                  "net/netfilter/xt_mark.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "85ff9a0f793ca52c527e75cd40a69c948627ebde",
                     status: "affected",
                     version: "0269ea4937343536ec7e85649932bc8c9686ea78",
                     versionType: "git",
                  },
                  {
                     lessThan: "8f482bb7e27b37f1f734bb9a8eeb28b23d59d189",
                     status: "affected",
                     version: "0269ea4937343536ec7e85649932bc8c9686ea78",
                     versionType: "git",
                  },
                  {
                     lessThan: "997f67d813ce0cf5eb3cdb8f124da68141e91b6c",
                     status: "affected",
                     version: "0269ea4937343536ec7e85649932bc8c9686ea78",
                     versionType: "git",
                  },
                  {
                     lessThan: "4cdc55ec6222bb195995cc58f7cb46e4d8907056",
                     status: "affected",
                     version: "0269ea4937343536ec7e85649932bc8c9686ea78",
                     versionType: "git",
                  },
                  {
                     lessThan: "0bfcb7b71e735560077a42847f69597ec7dcc326",
                     status: "affected",
                     version: "0269ea4937343536ec7e85649932bc8c9686ea78",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "net/netfilter/xt_CHECKSUM.c",
                  "net/netfilter/xt_CLASSIFY.c",
                  "net/netfilter/xt_CONNSECMARK.c",
                  "net/netfilter/xt_CT.c",
                  "net/netfilter/xt_IDLETIMER.c",
                  "net/netfilter/xt_LED.c",
                  "net/netfilter/xt_NFLOG.c",
                  "net/netfilter/xt_RATEEST.c",
                  "net/netfilter/xt_SECMARK.c",
                  "net/netfilter/xt_TRACE.c",
                  "net/netfilter/xt_addrtype.c",
                  "net/netfilter/xt_cluster.c",
                  "net/netfilter/xt_connbytes.c",
                  "net/netfilter/xt_connlimit.c",
                  "net/netfilter/xt_connmark.c",
                  "net/netfilter/xt_mark.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "2.6.30",
                  },
                  {
                     lessThan: "2.6.30",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.15.*",
                     status: "unaffected",
                     version: "5.15.168",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.113",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.57",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.11.*",
                     status: "unaffected",
                     version: "6.11.4",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.12",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: xtables: avoid NFPROTO_UNSPEC where needed\n\nsyzbot managed to call xt_cluster match via ebtables:\n\n WARNING: CPU: 0 PID: 11 at net/netfilter/xt_cluster.c:72 xt_cluster_mt+0x196/0x780\n [..]\n ebt_do_table+0x174b/0x2a40\n\nModule registers to NFPROTO_UNSPEC, but it assumes ipv4/ipv6 packet\nprocessing.  As this is only useful to restrict locally terminating\nTCP/UDP traffic, register this for ipv4 and ipv6 family only.\n\nPablo points out that this is a general issue, direct users of the\nset/getsockopt interface can call into targets/matches that were only\nintended for use with ip(6)tables.\n\nCheck all UNSPEC matches and targets for similar issues:\n\n- matches and targets are fine except if they assume skb_network_header()\n  is valid -- this is only true when called from inet layer: ip(6) stack\n  pulls the ip/ipv6 header into linear data area.\n- targets that return XT_CONTINUE or other xtables verdicts must be\n  restricted too, they are incompatbile with the ebtables traverser, e.g.\n  EBT_CONTINUE is a completely different value than XT_CONTINUE.\n\nMost matches/targets are changed to register for NFPROTO_IPV4/IPV6, as\nthey are provided for use by ip(6)tables.\n\nThe MARK target is also used by arptables, so register for NFPROTO_ARP too.\n\nWhile at it, bail out if connbytes fails to enable the corresponding\nconntrack family.\n\nThis change passes the selftests in iptables.git.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T09:31:52.316Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/85ff9a0f793ca52c527e75cd40a69c948627ebde",
            },
            {
               url: "https://git.kernel.org/stable/c/8f482bb7e27b37f1f734bb9a8eeb28b23d59d189",
            },
            {
               url: "https://git.kernel.org/stable/c/997f67d813ce0cf5eb3cdb8f124da68141e91b6c",
            },
            {
               url: "https://git.kernel.org/stable/c/4cdc55ec6222bb195995cc58f7cb46e4d8907056",
            },
            {
               url: "https://git.kernel.org/stable/c/0bfcb7b71e735560077a42847f69597ec7dcc326",
            },
         ],
         title: "netfilter: xtables: avoid NFPROTO_UNSPEC where needed",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-50038",
      datePublished: "2024-10-21T19:39:38.451Z",
      dateReserved: "2024-10-21T12:17:06.070Z",
      dateUpdated: "2024-12-19T09:31:52.316Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-50038\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T20:15:16.877\",\"lastModified\":\"2024-10-25T15:45:51.340\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: xtables: avoid NFPROTO_UNSPEC where needed\\n\\nsyzbot managed to call xt_cluster match via ebtables:\\n\\n WARNING: CPU: 0 PID: 11 at net/netfilter/xt_cluster.c:72 xt_cluster_mt+0x196/0x780\\n [..]\\n ebt_do_table+0x174b/0x2a40\\n\\nModule registers to NFPROTO_UNSPEC, but it assumes ipv4/ipv6 packet\\nprocessing.  As this is only useful to restrict locally terminating\\nTCP/UDP traffic, register this for ipv4 and ipv6 family only.\\n\\nPablo points out that this is a general issue, direct users of the\\nset/getsockopt interface can call into targets/matches that were only\\nintended for use with ip(6)tables.\\n\\nCheck all UNSPEC matches and targets for similar issues:\\n\\n- matches and targets are fine except if they assume skb_network_header()\\n  is valid -- this is only true when called from inet layer: ip(6) stack\\n  pulls the ip/ipv6 header into linear data area.\\n- targets that return XT_CONTINUE or other xtables verdicts must be\\n  restricted too, they are incompatbile with the ebtables traverser, e.g.\\n  EBT_CONTINUE is a completely different value than XT_CONTINUE.\\n\\nMost matches/targets are changed to register for NFPROTO_IPV4/IPV6, as\\nthey are provided for use by ip(6)tables.\\n\\nThe MARK target is also used by arptables, so register for NFPROTO_ARP too.\\n\\nWhile at it, bail out if connbytes fails to enable the corresponding\\nconntrack family.\\n\\nThis change passes the selftests in iptables.git.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: xtables: evita NFPROTO_UNSPEC donde sea necesario syzbot logró llamar a xt_cluster match a través de ebtables: ADVERTENCIA: CPU: 0 PID: 11 en net/netfilter/xt_cluster.c:72 xt_cluster_mt+0x196/0x780 [..] ebt_do_table+0x174b/0x2a40 El módulo se registra en NFPROTO_UNSPEC, pero asume el procesamiento de paquetes ipv4/ipv6. Como esto solo es útil para restringir el tráfico TCP/UDP que termina localmente, regístrelo solo para la familia ipv4 e ipv6. Pablo señala que este es un problema general, los usuarios directos de la interfaz set/getsockopt pueden llamar a destinos/coincidencias que solo estaban destinados a usarse con tablas ip(6). Compruebe todas las coincidencias y objetivos UNSPEC para ver si hay problemas similares: - las coincidencias y los objetivos están bien excepto si asumen que skb_network_header() es válido - esto solo es cierto cuando se llama desde la capa inet: la pila ip(6) extrae el encabezado ip/ipv6 en el área de datos lineales. - los objetivos que devuelven XT_CONTINUE u otros veredictos de xtables también deben restringirse, son incompatibles con el traverser de ebtables, por ejemplo, EBT_CONTINUE es un valor completamente diferente de XT_CONTINUE. La mayoría de las coincidencias/objetivos se cambian para registrarse para NFPROTO_IPV4/IPV6, ya que se proporcionan para su uso por ip(6)tables. El objetivo MARK también lo usan arptables, así que regístrese también para NFPROTO_ARP. Mientras tanto, abandone si connbytes no puede habilitar la familia conntrack correspondiente. Este cambio pasa las autopruebas en iptables.git.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.30\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"B7B7108B-7220-433F-A168-6ECF9D7F65F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.57\",\"matchCriteriaId\":\"05D83DB8-7465-4F88-AFB2-980011992AC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.11.4\",\"matchCriteriaId\":\"AA84D336-CE9A-4535-B901-1AD77EC17C34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F361E1D-580F-4A2D-A509-7615F73167A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"925478D0-3E3D-4E6F-ACD5-09F28D5DF82C\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0bfcb7b71e735560077a42847f69597ec7dcc326\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4cdc55ec6222bb195995cc58f7cb46e4d8907056\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/85ff9a0f793ca52c527e75cd40a69c948627ebde\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8f482bb7e27b37f1f734bb9a8eeb28b23d59d189\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/997f67d813ce0cf5eb3cdb8f124da68141e91b6c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-50038\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-22T13:25:10.359959Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-22T13:25:13.522Z\"}}], \"cna\": {\"title\": \"netfilter: xtables: avoid NFPROTO_UNSPEC where needed\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"0269ea493734\", \"lessThan\": \"85ff9a0f793c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0269ea493734\", \"lessThan\": \"8f482bb7e27b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0269ea493734\", \"lessThan\": \"997f67d813ce\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0269ea493734\", \"lessThan\": \"4cdc55ec6222\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0269ea493734\", \"lessThan\": \"0bfcb7b71e73\", \"versionType\": \"git\"}], \"programFiles\": [\"net/netfilter/xt_CHECKSUM.c\", \"net/netfilter/xt_CLASSIFY.c\", \"net/netfilter/xt_CONNSECMARK.c\", \"net/netfilter/xt_CT.c\", \"net/netfilter/xt_IDLETIMER.c\", \"net/netfilter/xt_LED.c\", \"net/netfilter/xt_NFLOG.c\", \"net/netfilter/xt_RATEEST.c\", \"net/netfilter/xt_SECMARK.c\", \"net/netfilter/xt_TRACE.c\", \"net/netfilter/xt_addrtype.c\", \"net/netfilter/xt_cluster.c\", \"net/netfilter/xt_connbytes.c\", \"net/netfilter/xt_connlimit.c\", \"net/netfilter/xt_connmark.c\", \"net/netfilter/xt_mark.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6.30\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"2.6.30\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.57\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12-rc3\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/netfilter/xt_CHECKSUM.c\", \"net/netfilter/xt_CLASSIFY.c\", \"net/netfilter/xt_CONNSECMARK.c\", \"net/netfilter/xt_CT.c\", \"net/netfilter/xt_IDLETIMER.c\", \"net/netfilter/xt_LED.c\", \"net/netfilter/xt_NFLOG.c\", \"net/netfilter/xt_RATEEST.c\", \"net/netfilter/xt_SECMARK.c\", \"net/netfilter/xt_TRACE.c\", \"net/netfilter/xt_addrtype.c\", \"net/netfilter/xt_cluster.c\", \"net/netfilter/xt_connbytes.c\", \"net/netfilter/xt_connlimit.c\", \"net/netfilter/xt_connmark.c\", \"net/netfilter/xt_mark.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/85ff9a0f793ca52c527e75cd40a69c948627ebde\"}, {\"url\": \"https://git.kernel.org/stable/c/8f482bb7e27b37f1f734bb9a8eeb28b23d59d189\"}, {\"url\": \"https://git.kernel.org/stable/c/997f67d813ce0cf5eb3cdb8f124da68141e91b6c\"}, {\"url\": \"https://git.kernel.org/stable/c/4cdc55ec6222bb195995cc58f7cb46e4d8907056\"}, {\"url\": \"https://git.kernel.org/stable/c/0bfcb7b71e735560077a42847f69597ec7dcc326\"}], \"x_generator\": {\"engine\": \"bippy-9e1c9544281a\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: xtables: avoid NFPROTO_UNSPEC where needed\\n\\nsyzbot managed to call xt_cluster match via ebtables:\\n\\n WARNING: CPU: 0 PID: 11 at net/netfilter/xt_cluster.c:72 xt_cluster_mt+0x196/0x780\\n [..]\\n ebt_do_table+0x174b/0x2a40\\n\\nModule registers to NFPROTO_UNSPEC, but it assumes ipv4/ipv6 packet\\nprocessing.  As this is only useful to restrict locally terminating\\nTCP/UDP traffic, register this for ipv4 and ipv6 family only.\\n\\nPablo points out that this is a general issue, direct users of the\\nset/getsockopt interface can call into targets/matches that were only\\nintended for use with ip(6)tables.\\n\\nCheck all UNSPEC matches and targets for similar issues:\\n\\n- matches and targets are fine except if they assume skb_network_header()\\n  is valid -- this is only true when called from inet layer: ip(6) stack\\n  pulls the ip/ipv6 header into linear data area.\\n- targets that return XT_CONTINUE or other xtables verdicts must be\\n  restricted too, they are incompatbile with the ebtables traverser, e.g.\\n  EBT_CONTINUE is a completely different value than XT_CONTINUE.\\n\\nMost matches/targets are changed to register for NFPROTO_IPV4/IPV6, as\\nthey are provided for use by ip(6)tables.\\n\\nThe MARK target is also used by arptables, so register for NFPROTO_ARP too.\\n\\nWhile at it, bail out if connbytes fails to enable the corresponding\\nconntrack family.\\n\\nThis change passes the selftests in iptables.git.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-11-05T09:53:57.437Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-50038\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-05T09:53:57.437Z\", \"dateReserved\": \"2024-10-21T12:17:06.070Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T19:39:38.451Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.