In the Linux kernel, the following vulnerability has been resolved:
netfilter: tproxy: bail out if IP has been disabled on the device
syzbot reports: general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] [..] RIP: 0010:nftproxyladdr4+0xb7/0x340 net/ipv4/netfilter/nftproxyipv4.c:62 Call Trace: nfttproxyevalv4 net/netfilter/nfttproxy.c:56 [inline] nfttproxyeval+0xa9a/0x1a00 net/netfilter/nft_tproxy.c:168
_indevgetrcu() can return NULL, so check for this.
[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-36270-303f0236",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10f0af5234dafd03d2b75233428ec3f11cf7e43d",
"digest": {
"line_hashes": [
"115073011416733249848049988455901544385",
"223134058106026083219033882376023555188",
"16200694240619695556965899723236693021",
"48225822739860867579526902951850290749"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/netfilter/nf_tproxy_ipv4.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-36270-4a89d1d1",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@570b4c52096e62fda562448f5760fd0ff06110f0",
"digest": {
"line_hashes": [
"115073011416733249848049988455901544385",
"223134058106026083219033882376023555188",
"16200694240619695556965899723236693021",
"48225822739860867579526902951850290749"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/netfilter/nf_tproxy_ipv4.c"
}
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2024-36270-7188259c",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@570b4c52096e62fda562448f5760fd0ff06110f0",
"digest": {
"function_hash": "193605183150831244417051679596475213681",
"length": 337.0
},
"target": {
"file": "net/ipv4/netfilter/nf_tproxy_ipv4.c",
"function": "nf_tproxy_laddr4"
}
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-36270-8187dd5f",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@caf3a8afb5ea00db6d5398adf148d5534615fd80",
"digest": {
"line_hashes": [
"115073011416733249848049988455901544385",
"223134058106026083219033882376023555188",
"16200694240619695556965899723236693021",
"48225822739860867579526902951850290749"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/netfilter/nf_tproxy_ipv4.c"
}
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2024-36270-ad9fa11a",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10f0af5234dafd03d2b75233428ec3f11cf7e43d",
"digest": {
"function_hash": "193605183150831244417051679596475213681",
"length": 337.0
},
"target": {
"file": "net/ipv4/netfilter/nf_tproxy_ipv4.c",
"function": "nf_tproxy_laddr4"
}
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2024-36270-ba9294bf",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@caf3a8afb5ea00db6d5398adf148d5534615fd80",
"digest": {
"function_hash": "193605183150831244417051679596475213681",
"length": 337.0
},
"target": {
"file": "net/ipv4/netfilter/nf_tproxy_ipv4.c",
"function": "nf_tproxy_laddr4"
}
}
]