In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_inner: validate mandatory meta and payload
Check for mandatory netlink attributes in payload and meta expression when used embedded from the inner expression, otherwise NULL pointer dereference is possible from userspace.
[
{
"deprecated": false,
"target": {
"file": "net/netfilter/nft_payload.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"22430165962140740420932716654803149473",
"82274104663701615894140742164483829004",
"51561507254921817716378535960484574621"
]
},
"id": "CVE-2024-39504-21fbe80d",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c4ab9da85b9df3692f861512fe6c9812f38b7471",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "net/netfilter/nft_payload.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"22430165962140740420932716654803149473",
"82274104663701615894140742164483829004",
"51561507254921817716378535960484574621"
]
},
"id": "CVE-2024-39504-7e185d7e",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b30669fdea0ca03aa22995e6c99f7e7d9dee89ff",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "net/netfilter/nft_payload.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"22430165962140740420932716654803149473",
"82274104663701615894140742164483829004",
"51561507254921817716378535960484574621"
]
},
"id": "CVE-2024-39504-b58c0b72",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@39323f54cad29602917848346c71b087da92a19d",
"signature_version": "v1"
}
]