First published: Thu Jan 21 2016(Updated: )
Kernel NULL pointer dereference vulnerability was found in netfilter/nf_nat_redirect.c in nf_nat_redirect_ipv4 function introduced by commit 8b13eddfdf04cbfa561725cfc42d6868fe896f56 ("netfilter: refactor NAT redirect IPv4 to use it from nf_tables"). Vulnerable code: unsigned int nf_nat_redirect_ipv4(struct sk_buff *skb, ... { ... rcu_read_lock(); indev = __in_dev_get_rcu(skb->dev); if (indev != NULL) { ifa = indev->ifa_list; newdst = ifa->ifa_local; <--- } rcu_read_unlock(); ... } 'ifa' is not checked before access and can be accessed even if it's NULL. Crash might happen when packets that need to be redirected somehow arrive on an interface which hasn't been yet fully configured. Patch and crash report: <a href="https://lkml.org/lkml/2015/12/2/618">https://lkml.org/lkml/2015/12/2/618</a> Oss-security reference: <a href="http://seclists.org/oss-sec/2016/q1/223">http://seclists.org/oss-sec/2016/q1/223</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q1/226">http://seclists.org/oss-sec/2016/q1/226</a>
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.19<4.1.31 | |
Linux Linux kernel | >=4.2<4.4 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.7-1 6.11.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2015-8787.
The severity of CVE-2015-8787 is medium with a severity value of 4.
CVE-2015-8787 allows remote attackers to cause a denial of service or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured system, leading to a NULL pointer dereference and system crash.
Versions of the Linux kernel before version 4.4 are affected by CVE-2015-8787.
To fix CVE-2015-8787, update your Linux kernel to version 4.4 or later.