In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_tproxy: restrict to prerouting hook
TPROXY is only allowed from prerouting, but nft_tproxy doesn't check this. This fixes a crash (null dereference) when using tproxy from e.g. output.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a1d92cbeac3335fee99fa865b8c5b0f2e71a8f7",
"target": {
"file": "net/netfilter/nft_tproxy.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50001-0cd38016",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"21184610186623639462402450927753572848",
"2222510086355794327389799539295802363",
"85595020796585912494466000105538776144",
"137711579741128382294238876326379696543",
"332103928263440714430285999371526954143",
"207929600911821343128265490519294975406",
"99312520491440694848653372702692829148"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eaba3f9b672c3a3f820da8ee9584b9520674eafa",
"target": {
"file": "net/netfilter/nft_tproxy.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50001-0ebf7f89",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"21184610186623639462402450927753572848",
"2222510086355794327389799539295802363",
"85595020796585912494466000105538776144",
"1738866440309663822626714578902740142",
"229003966821147071413990127824539711031",
"217992892281382577128157503515296311684",
"99312520491440694848653372702692829148"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@343fed6b0daeb528ae5c9d4d84d9ff763ac95619",
"target": {
"file": "net/netfilter/nft_tproxy.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50001-395d0e6e",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"21184610186623639462402450927753572848",
"2222510086355794327389799539295802363",
"85595020796585912494466000105538776144",
"277189187367849048197073111912634467733",
"134603236489790572611251976871304868242",
"137544217776435059903288530593530265001",
"192294206710792309157410619422984317631"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0b21edf4cc13516716848e0a4fdf726aa2a62cd9",
"target": {
"file": "net/netfilter/nft_tproxy.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50001-730b9248",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"21184610186623639462402450927753572848",
"2222510086355794327389799539295802363",
"85595020796585912494466000105538776144",
"1738866440309663822626714578902740142",
"229003966821147071413990127824539711031",
"217992892281382577128157503515296311684",
"99312520491440694848653372702692829148"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@18bbc3213383a82b05383827f4b1b882e3f0a5a5",
"target": {
"file": "net/netfilter/nft_tproxy.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50001-bd336e72",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"21184610186623639462402450927753572848",
"2222510086355794327389799539295802363",
"85595020796585912494466000105538776144",
"277189187367849048197073111912634467733",
"134603236489790572611251976871304868242",
"137544217776435059903288530593530265001",
"192294206710792309157410619422984317631"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@83ef55c4281f1b4c6bd4457c2e96ccd1c9e80200",
"target": {
"file": "net/netfilter/nft_tproxy.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50001-e8aee071",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"21184610186623639462402450927753572848",
"2222510086355794327389799539295802363",
"85595020796585912494466000105538776144",
"1738866440309663822626714578902740142",
"229003966821147071413990127824539711031",
"217992892281382577128157503515296311684",
"99312520491440694848653372702692829148"
]
}
}
]