{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-50038","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-10-21T12:17:06.070Z","datePublished":"2024-10-21T19:39:38.451Z","dateUpdated":"2025-11-03T22:24:43.902Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:44:25.094Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: xtables: avoid NFPROTO_UNSPEC where needed\n\nsyzbot managed to call xt_cluster match via ebtables:\n\n WARNING: CPU: 0 PID: 11 at net/netfilter/xt_cluster.c:72 xt_cluster_mt+0x196/0x780\n [..]\n ebt_do_table+0x174b/0x2a40\n\nModule registers to NFPROTO_UNSPEC, but it assumes ipv4/ipv6 packet\nprocessing.  As this is only useful to restrict locally terminating\nTCP/UDP traffic, register this for ipv4 and ipv6 family only.\n\nPablo points out that this is a general issue, direct users of the\nset/getsockopt interface can call into targets/matches that were only\nintended for use with ip(6)tables.\n\nCheck all UNSPEC matches and targets for similar issues:\n\n- matches and targets are fine except if they assume skb_network_header()\n  is valid -- this is only true when called from inet layer: ip(6) stack\n  pulls the ip/ipv6 header into linear data area.\n- targets that return XT_CONTINUE or other xtables verdicts must be\n  restricted too, they are incompatbile with the ebtables traverser, e.g.\n  EBT_CONTINUE is a completely different value than XT_CONTINUE.\n\nMost matches/targets are changed to register for NFPROTO_IPV4/IPV6, as\nthey are provided for use by ip(6)tables.\n\nThe MARK target is also used by arptables, so register for NFPROTO_ARP too.\n\nWhile at it, bail out if connbytes fails to enable the corresponding\nconntrack family.\n\nThis change passes the selftests in iptables.git."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/netfilter/xt_CHECKSUM.c","net/netfilter/xt_CLASSIFY.c","net/netfilter/xt_CONNSECMARK.c","net/netfilter/xt_CT.c","net/netfilter/xt_IDLETIMER.c","net/netfilter/xt_LED.c","net/netfilter/xt_NFLOG.c","net/netfilter/xt_RATEEST.c","net/netfilter/xt_SECMARK.c","net/netfilter/xt_TRACE.c","net/netfilter/xt_addrtype.c","net/netfilter/xt_cluster.c","net/netfilter/xt_connbytes.c","net/netfilter/xt_connlimit.c","net/netfilter/xt_connmark.c","net/netfilter/xt_mark.c"],"versions":[{"version":"0269ea4937343536ec7e85649932bc8c9686ea78","lessThan":"85ff9a0f793ca52c527e75cd40a69c948627ebde","status":"affected","versionType":"git"},{"version":"0269ea4937343536ec7e85649932bc8c9686ea78","lessThan":"8f482bb7e27b37f1f734bb9a8eeb28b23d59d189","status":"affected","versionType":"git"},{"version":"0269ea4937343536ec7e85649932bc8c9686ea78","lessThan":"997f67d813ce0cf5eb3cdb8f124da68141e91b6c","status":"affected","versionType":"git"},{"version":"0269ea4937343536ec7e85649932bc8c9686ea78","lessThan":"4cdc55ec6222bb195995cc58f7cb46e4d8907056","status":"affected","versionType":"git"},{"version":"0269ea4937343536ec7e85649932bc8c9686ea78","lessThan":"0bfcb7b71e735560077a42847f69597ec7dcc326","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/netfilter/xt_CHECKSUM.c","net/netfilter/xt_CLASSIFY.c","net/netfilter/xt_CONNSECMARK.c","net/netfilter/xt_CT.c","net/netfilter/xt_IDLETIMER.c","net/netfilter/xt_LED.c","net/netfilter/xt_NFLOG.c","net/netfilter/xt_RATEEST.c","net/netfilter/xt_SECMARK.c","net/netfilter/xt_TRACE.c","net/netfilter/xt_addrtype.c","net/netfilter/xt_cluster.c","net/netfilter/xt_connbytes.c","net/netfilter/xt_connlimit.c","net/netfilter/xt_connmark.c","net/netfilter/xt_mark.c"],"versions":[{"version":"2.6.30","status":"affected"},{"version":"0","lessThan":"2.6.30","status":"unaffected","versionType":"semver"},{"version":"5.15.168","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.113","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.57","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.11.4","lessThanOrEqual":"6.11.*","status":"unaffected","versionType":"semver"},{"version":"6.12","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"5.15.168"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"6.1.113"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"6.6.57"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"6.11.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"6.12"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/85ff9a0f793ca52c527e75cd40a69c948627ebde"},{"url":"https://git.kernel.org/stable/c/8f482bb7e27b37f1f734bb9a8eeb28b23d59d189"},{"url":"https://git.kernel.org/stable/c/997f67d813ce0cf5eb3cdb8f124da68141e91b6c"},{"url":"https://git.kernel.org/stable/c/4cdc55ec6222bb195995cc58f7cb46e4d8907056"},{"url":"https://git.kernel.org/stable/c/0bfcb7b71e735560077a42847f69597ec7dcc326"}],"title":"netfilter: xtables: avoid NFPROTO_UNSPEC where needed","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-50038","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-10-22T13:25:10.359959Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-22T13:28:44.637Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:24:43.902Z"}}]}}