In the Linux kernel, the following vulnerability has been resolved:
wireguard: netlink: access device through ctx instead of peer
The previous commit fixed a bug that led to a NULL peer->device being dereferenced. It's actually easier and faster performance-wise to instead get the device from ctx->wg. This semantically makes more sense too, since ctx->wg->peerallowedips.seq is compared with ctx->allowedipsseq, basing them both in ctx. This also acts as a defence in depth provision against freed peers.
[
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/wireguard/netlink.c"
},
"digest": {
"line_hashes": [
"179421254234920665395028859815255068742",
"14859258765119653651790296759760914235",
"258741145335705682608896413188043390039",
"334852714184050985784199319655290850200",
"185870986242521036903885572187547946866"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@93bcc1752c69bb309f4d8cfaf960ef1faeb34996",
"signature_version": "v1",
"id": "CVE-2024-26950-004c4f49"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/wireguard/netlink.c"
},
"digest": {
"line_hashes": [
"179421254234920665395028859815255068742",
"14859258765119653651790296759760914235",
"258741145335705682608896413188043390039",
"334852714184050985784199319655290850200",
"185870986242521036903885572187547946866"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@09c3fa70f65175861ca948cb2f0f791e666c90e5",
"signature_version": "v1",
"id": "CVE-2024-26950-13940377"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/wireguard/netlink.c",
"function": "get_peer"
},
"digest": {
"length": 2585.0,
"function_hash": "160664386363925415687474607801297069985"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@71cbd32e3db82ea4a74e3ef9aeeaa6971969c86f",
"signature_version": "v1",
"id": "CVE-2024-26950-435d92ab"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/wireguard/netlink.c",
"function": "get_peer"
},
"digest": {
"length": 2585.0,
"function_hash": "160664386363925415687474607801297069985"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@09c3fa70f65175861ca948cb2f0f791e666c90e5",
"signature_version": "v1",
"id": "CVE-2024-26950-6225c29f"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/wireguard/netlink.c",
"function": "get_peer"
},
"digest": {
"length": 2585.0,
"function_hash": "160664386363925415687474607801297069985"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4be453271a882c8ebc28df3dbf9e4d95e6ac42f5",
"signature_version": "v1",
"id": "CVE-2024-26950-89de9bd1"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/wireguard/netlink.c"
},
"digest": {
"line_hashes": [
"179421254234920665395028859815255068742",
"14859258765119653651790296759760914235",
"258741145335705682608896413188043390039",
"334852714184050985784199319655290850200",
"185870986242521036903885572187547946866"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4be453271a882c8ebc28df3dbf9e4d95e6ac42f5",
"signature_version": "v1",
"id": "CVE-2024-26950-a7c8c379"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/wireguard/netlink.c",
"function": "get_peer"
},
"digest": {
"length": 2585.0,
"function_hash": "160664386363925415687474607801297069985"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@93bcc1752c69bb309f4d8cfaf960ef1faeb34996",
"signature_version": "v1",
"id": "CVE-2024-26950-b507cf9c"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/wireguard/netlink.c"
},
"digest": {
"line_hashes": [
"179421254234920665395028859815255068742",
"14859258765119653651790296759760914235",
"258741145335705682608896413188043390039",
"334852714184050985784199319655290850200",
"185870986242521036903885572187547946866"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@71cbd32e3db82ea4a74e3ef9aeeaa6971969c86f",
"signature_version": "v1",
"id": "CVE-2024-26950-be0317b6"
}
]