CVE-2024-42269

In the Linux kernel, the following vulnerability has been resolved: netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init(). ip6table_nat_table_init() accesses net->gen->ptr[ip6table_nat_net_ops.id], but the function is exposed to user space before the entry is allocated via register_pernet_subsys(). Let's call register_pernet_subsys() before xt_register_template().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*

History

19 Aug 2024, 20:53

Type Values Removed Values Added
CWE CWE-476
References () https://git.kernel.org/stable/c/419ee6274c5153b89c4393c1946faa4c3cad4f9e - () https://git.kernel.org/stable/c/419ee6274c5153b89c4393c1946faa4c3cad4f9e - Patch
References () https://git.kernel.org/stable/c/87dba44e9471b79b255d0736858a897332db9226 - () https://git.kernel.org/stable/c/87dba44e9471b79b255d0736858a897332db9226 - Patch
References () https://git.kernel.org/stable/c/91b6df6611b7edb28676c4f63f90c56c30d3e601 - () https://git.kernel.org/stable/c/91b6df6611b7edb28676c4f63f90c56c30d3e601 - Patch
References () https://git.kernel.org/stable/c/c22921df777de5606f1047b1345b8d22ef1c0b34 - () https://git.kernel.org/stable/c/c22921df777de5606f1047b1345b8d22ef1c0b34 - Patch
References () https://git.kernel.org/stable/c/e85b9b6a87be4cb3710082038b677e97f2389003 - () https://git.kernel.org/stable/c/e85b9b6a87be4cb3710082038b677e97f2389003 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

19 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: iptables: corrige el potencial null-ptr-deref en ip6table_nat_table_init(). ip6table_nat_table_init() accede a net->gen->ptr[ip6table_nat_net_ops.id], pero la función está expuesta al espacio del usuario antes de que la entrada se asigne a través de Register_pernet_subsys(). Llamemos a Register_pernet_subsys() antes de xt_register_template().

19 Aug 2024, 05:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/419ee6274c5153b89c4393c1946faa4c3cad4f9e -

17 Aug 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-17 09:15

Updated : 2024-08-19 20:53


NVD link : CVE-2024-42269

Mitre link : CVE-2024-42269

CVE.ORG link : CVE-2024-42269


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference