Vulnerability Details : CVE-2024-39504
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_inner: validate mandatory meta and payload
Check for mandatory netlink attributes in payload and meta expression
when used embedded from the inner expression, otherwise NULL pointer
dereference is possible from userspace.
Vulnerability category: Memory Corruption
Products affected by CVE-2024-39504
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-39504
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 11 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-39504
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2024-08-28 |
CWE ids for CVE-2024-39504
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2024-39504
-
https://git.kernel.org/stable/c/b30669fdea0ca03aa22995e6c99f7e7d9dee89ff
netfilter: nft_inner: validate mandatory meta and payload - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/c4ab9da85b9df3692f861512fe6c9812f38b7471
netfilter: nft_inner: validate mandatory meta and payload - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/39323f54cad29602917848346c71b087da92a19d
netfilter: nft_inner: validate mandatory meta and payload - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to