Bug 2278380 (CVE-2024-27065)
Summary: | CVE-2024-27065 kernel: netfilter: nf_tables: do not compare internal table flags on updates | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Zack Miele <zmiele> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, fwestpha, hkrzesin, jarod, jburrell, jdenham, jfaracco, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, lzampier, mleitner, mmilgram, mstowell, nmurray, psutter, ptalbert, rparrazo, rrobaina, rvrbovsk, rysulliv, scweaver, sidakwo, sukulkar, tglozar, tyberry, vkumar, vsroka, wcosta, williams, wmealing, ycote, ykopkova, zhijwang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | Flags: | psutter:
needinfo?
(fwestpha) |
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel 5.4.273, kernel 5.10.214, kernel 5.15.153, kernel 6.1.83, kernel 6.6.23, kernel 6.7.11, kernel 6.8.2, kernel 6.9-rc1 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2278381 | ||
Bug Blocks: | 2278552 |
Description
Zack Miele
2024-05-01 20:00:09 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2278381] I don't see any security implication of the fixed bug. Florian, Zack, Alex, do you? In reply to comment #10: > I don't see any security implication of the fixed bug. Florian, Zack, Alex, > do you? I decrease it to Low. Based on that incorrect behavior in the nf_tables_updtable can lead to security issue (ex. see older https://access.redhat.com/security/cve/CVE-2023-1095 ), I cannot say if this is not a bug at all. (In reply to Alex from comment #11) > In reply to comment #10: > > I don't see any security implication of the fixed bug. Florian, Zack, Alex, > > do you? > > I decrease it to Low. Thanks, Alex! > Based on that incorrect behavior in the nf_tables_updtable can lead to > security issue (ex. see older > https://access.redhat.com/security/cve/CVE-2023-1095 ), I cannot say if this > is not a bug at all. Sure, this is undoubtedly a bug. I merely want to reduce the required effort to deal with it. Is it acceptable to not z-stream CVE fixes if they are low severity? A bit off-topic, but CVE-2023-1095 seems fishy, too: The bug is a call to list_del() for an element not on a list. The respective list_head object has a defined value though (it was allocated by kzalloc()). The behaviour is deterministic and immutable AIUI, so not exploitable per se? (In reply to Phil Sutter from comment #12) > [...] Is it acceptable to not z-stream CVE fixes if they are low > severity? Please ignore this question. I just skimmed 27.6. CVE process[1] in RHEL devel guide which is unambiguous. [1] https://one.redhat.com/rhel-development-guide/#assembly_cve-process_assembly_security-practices This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4823 https://access.redhat.com/errata/RHSA-2024:4823 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4831 https://access.redhat.com/errata/RHSA-2024:4831 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:5102 https://access.redhat.com/errata/RHSA-2024:5102 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:5101 https://access.redhat.com/errata/RHSA-2024:5101 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:5363 https://access.redhat.com/errata/RHSA-2024:5363 |