CVE-2024-36270

CVSS v3.1 5.5 (Medium)
55% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 1
Advisories 29
NVD Status Analyzed

In the Linux kernel, the following vulnerability has been resolved:

netfilter: tproxy: bail out if IP has been disabled on the device

syzbot reports:
general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
[..]
RIP: 0010:nf_tproxy_laddr4+0xb7/0x340 net/ipv4/netfilter/nf_tproxy_ipv4.c:62
Call Trace:
nft_tproxy_eval_v4 net/netfilter/nft_tproxy.c:56 [inline]
nft_tproxy_eval+0xa9a/0x1a00 net/netfilter/nft_tproxy.c:168

__in_dev_get_rcu() can return NULL, so check for this.

Weaknesses
CWE-476
NULL Pointer Dereference
CVE Status
PUBLISHED
NVD Status
Analyzed
CNA
kernel.org
Published Date
2024-06-21 11:15:10
(2 months ago)
Updated Date
2024-09-09 13:16:22
(7 days ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel from 2.6.37 version and prior 5.4.278 version cpe:2.3:o:linux:linux_kernel >= 2.6.37 < 5.4.278
  Linux Kernel from 5.5 version and prior 5.10.219 version cpe:2.3:o:linux:linux_kernel >= 5.5 < 5.10.219
  Linux Kernel from 5.11 version and prior 5.15.161 version cpe:2.3:o:linux:linux_kernel >= 5.11 < 5.15.161
  Linux Kernel from 5.16 version and prior 6.1.93 version cpe:2.3:o:linux:linux_kernel >= 5.16 < 6.1.93
  Linux Kernel from 6.2 version and prior 6.6.33 version cpe:2.3:o:linux:linux_kernel >= 6.2 < 6.6.33
  Linux Kernel from 6.7 version and prior 6.9.4 version cpe:2.3:o:linux:linux_kernel >= 6.7 < 6.9.4
  Linux Kernel 6.10 Rc1 cpe:2.3:o:linux:linux_kernel:6.10:rc1
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...