CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
In the Linux kernel, the following vulnerability has been resolved:
netfilter: iptables: Fix potential null-ptr-deref in
ip6table_nat_table_init().
ip6table_nat_table_init() accesses net->gen->ptr[ip6table_nat_net_ops.id],
but the function is exposed to user space before the entry is allocated
via register_pernet_subsys().
Let’s call register_pernet_subsys() before xt_register_template().
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-fde | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-fde-5.15 | < any | UNKNOWN |
git.kernel.org/linus/c22921df777de5606f1047b1345b8d22ef1c0b34 (6.11-rc2)
git.kernel.org/stable/c/419ee6274c5153b89c4393c1946faa4c3cad4f9e
git.kernel.org/stable/c/87dba44e9471b79b255d0736858a897332db9226
git.kernel.org/stable/c/91b6df6611b7edb28676c4f63f90c56c30d3e601
git.kernel.org/stable/c/c22921df777de5606f1047b1345b8d22ef1c0b34
git.kernel.org/stable/c/e85b9b6a87be4cb3710082038b677e97f2389003
launchpad.net/bugs/cve/CVE-2024-42269
nvd.nist.gov/vuln/detail/CVE-2024-42269
security-tracker.debian.org/tracker/CVE-2024-42269
www.cve.org/CVERecord?id=CVE-2024-42269