CVE-2024-36270

Updated: 2024-11-30 04:09:36.488892

Description:

In the Linux kernel, the following vulnerability has been resolved: netfilter: tproxy: bail out if IP has been disabled on the device syzbot reports: general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] [..] RIP: 0010:nf_tproxy_laddr4+0xb7/0x340 net/ipv4/netfilter/nf_tproxy_ipv4.c:62 Call Trace: nft_tproxy_eval_v4 net/netfilter/nft_tproxy.c:56 [inline] nft_tproxy_eval+0xa9a/0x1a00 net/netfilter/nft_tproxy.c:168 __in_dev_get_rcu() can return NULL, so check for this.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Released CLSA-2025:1743193221 2024-08-01 14:29:54
CentOS 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-07-17 17:24:06
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-07-17 17:24:06
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-08-20 12:23:00
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-08-20 12:23:00
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-08-20 12:23:00
CloudLinux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-07-17 17:24:06
CloudLinux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-08-13 14:25:07
Oracle Linux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-07-17 17:24:06
Oracle Linux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-12-03 12:09:44
Total: 14