Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-26673

Опубликовано: 02 апр. 2024
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations

  • Disallow families other than NFPROTO_{IPV4,IPV6,INET}.
  • Disallow layer 4 protocol with no ports, since destination port is a mandatory attribute for this object.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 9kernelFixedRHSA-2024:330623.05.2024
Red Hat Enterprise Linux 9kernelFixedRHSA-2024:330623.05.2024
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionskernelFixedRHSA-2024:441509.07.2024
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutionskernel-rtFixedRHSA-2024:441209.07.2024

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-99
https://bugzilla.redhat.com/show_bug.cgi?id=2272816kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations

EPSS

Процентиль: 0%
0.00007
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - Disallow families other than NFPROTO_{IPV4,IPV6,INET}. - Disallow layer 4 protocol with no ports, since destination port is a mandatory attribute for this object.

CVSS3: 7.1
nvd
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - Disallow families other than NFPROTO_{IPV4,IPV6,INET}. - Disallow layer 4 protocol with no ports, since destination port is a mandatory attribute for this object.

CVSS3: 7.1
debian
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 7.1
github
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - Disallow families other than NFPROTO_{IPV4,IPV6,INET}. - Disallow layer 4 protocol with no ports, since destination port is a mandatory attribute for this object.

oracle-oval
около 1 года назад

ELSA-2024-3306: kernel security and bug fix update (MODERATE)

EPSS

Процентиль: 0%
0.00007
Низкий

6.1 Medium

CVSS3

Уязвимость CVE-2024-26673