2024-11-07 11:03:21 +00:00
{
"id" : "CVE-2024-50142" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-11-07T10:15:06.170" ,
2024-11-23 17:04:17 +00:00
"lastModified" : "2024-11-22T16:47:08.477" ,
"vulnStatus" : "Analyzed" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2024-11-07 11:03:21 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: validate new SA's prefixlen using SA family when sel.family is unset\n\nThis expands the validation introduced in commit 07bf7908950a (\"xfrm:\nValidate address prefix lengths in the xfrm selector.\")\n\nsyzbot created an SA with\n usersa.sel.family = AF_UNSPEC\n usersa.sel.prefixlen_s = 128\n usersa.family = AF_INET\n\nBecause of the AF_UNSPEC selector, verify_newsa_info doesn't put\nlimits on prefixlen_{s,d}. But then copy_from_user_state sets\nx->sel.family to usersa.family (AF_INET). Do the same conversion in\nverify_newsa_info before validating prefixlen_{s,d}, since that's how\nprefixlen is going to be used later on."
2024-11-08 17:03:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xfrm: validar el prefijo de la nueva SA usando la familia de SA cuando sel.family no est\u00e1 configurado Esto expande la validaci\u00f3n introducida en el commit 07bf7908950a (\"xfrm: validar las longitudes de prefijo de direcci\u00f3n en el selector xfrm\"). syzbot cre\u00f3 una SA con usersa.sel.family = AF_UNSPEC usersa.sel.prefixlen_s = 128 usersa.family = AF_INET Debido al selector AF_UNSPEC, verificar_newsa_info no pone l\u00edmites en prefixlen_{s,d}. Pero luego copy_from_user_state establece x->sel.family en usersa.family (AF_INET). Realice la misma conversi\u00f3n en verificar_newsa_info antes de validar prefixlen_{s,d}, ya que as\u00ed es como se usar\u00e1 prefixlen m\u00e1s adelante."
2024-11-07 11:03:21 +00:00
}
] ,
2024-11-23 17:04:17 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
"baseScore" : 5.5 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.6.12" ,
"versionEndExcluding" : "4.19.323" ,
"matchCriteriaId" : "412BD203-5581-4B41-81A3-77F90DAD48A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.20" ,
"versionEndExcluding" : "5.4.285" ,
"matchCriteriaId" : "B5A89369-320F-47FC-8695-56F61F87E4C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.5" ,
"versionEndExcluding" : "5.10.229" ,
"matchCriteriaId" : "1A03CABE-9B43-4E7F-951F-10DEEADAA426"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.11" ,
"versionEndExcluding" : "5.15.170" ,
"matchCriteriaId" : "A9BA1C73-2D2E-45E3-937B-276A28AEB5FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.16" ,
"versionEndExcluding" : "6.1.115" ,
"matchCriteriaId" : "C08A77A6-E42E-4EFD-B5A1-2BF6CBBB42AE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.2" ,
"versionEndExcluding" : "6.6.59" ,
"matchCriteriaId" : "5D15CA59-D15C-4ACD-8B03-A072DEAD2081"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.7" ,
"versionEndExcluding" : "6.11.6" ,
"matchCriteriaId" : "E4486B12-007B-4794-9857-F07145637AA1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F361E1D-580F-4A2D-A509-7615F73167A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*" ,
"matchCriteriaId" : "E0F717D8-3014-4F84-8086-0124B2111379"
}
]
}
]
}
] ,
2024-11-07 11:03:21 +00:00
"references" : [
{
"url" : "https://git.kernel.org/stable/c/2d08a6c31c65f23db71a5385ee9cf9d8f9a67a71" ,
2024-11-23 17:04:17 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-11-07 11:03:21 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563" ,
2024-11-23 17:04:17 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-11-07 11:03:21 +00:00
} ,
2024-11-08 17:03:28 +00:00
{
"url" : "https://git.kernel.org/stable/c/401ad99a5ae7180dd9449eac104cb755f442e7f3" ,
2024-11-23 17:04:17 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-11-08 17:03:28 +00:00
} ,
2024-11-07 11:03:21 +00:00
{
"url" : "https://git.kernel.org/stable/c/7d9868180bd1e4cf37e7c5067362658971162366" ,
2024-11-23 17:04:17 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-11-07 11:03:21 +00:00
} ,
2024-11-08 17:03:28 +00:00
{
"url" : "https://git.kernel.org/stable/c/8df5cd51fd70c33aa1776e5cbcd82b0a86649d73" ,
2024-11-23 17:04:17 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-11-08 17:03:28 +00:00
} ,
2024-11-07 11:03:21 +00:00
{
"url" : "https://git.kernel.org/stable/c/bce1afaa212ec380bf971614f70909a27882b862" ,
2024-11-23 17:04:17 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-11-07 11:03:21 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/e68dd80ba498265d2266b12dc3459164f4ff0c4a" ,
2024-11-23 17:04:17 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-11-08 17:03:28 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/f31398570acf0f0804c644006f7bfa9067106b0a" ,
2024-11-23 17:04:17 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-11-07 11:03:21 +00:00
}
]
}