Release Date: | 2024-07-12 |
In the Linux kernel, the following vulnerability has been resolved:\nseg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors\ninput_action_end_dx4() and input_action_end_dx6() are called NF_HOOK() for\nPREROUTING hook, in PREROUTING hook, we should passing a valid indev,\nand a NULL outdev to NF_HOOK(), otherwise may trigger a NULL pointer\ndereference, as below:\n[74830.647293] BUG: kernel NULL pointer dereference, address: 0000000000000090\n[74830.655633] #PF: supervisor read access in kernel mode\n[74830.657888] #PF: error_code(0x0000) - not-present page\n[74830.659500] PGD 0 P4D 0\n[74830.660450] Oops: 0000 [#1] PREEMPT SMP PTI\n...\n[74830.664953] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\n[74830.666569] RIP: 0010:rpfilter_mt+0x44/0x15e [ipt_rpfilter]\n...\n[74830.689725] Call Trace:\n[74830.690402]
See more information about CVE-2024-40957 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.1 metrics and score provided are preliminary and subject to review.
Base Score: | 5.5 | CVSS Vector: | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Attack Vector: | Local network | Attack Complexity: | Low |
Privileges Required: | Low | User Interaction: | None |
Scope: | Unchanged | Confidentiality Impact: | None |
Integrity Impact: | None | Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 8 (kernel-uek) | ELSA-2024-12618 | 2024-09-12 |
Oracle Linux version 9 (kernel) | ELSA-2024-5928 | 2024-08-28 |
Oracle Linux version 9 (kernel-uek) | ELSA-2024-12618 | 2024-09-12 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: