First published: Thu Jan 23 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_set_pipapo: fix initial map fill The initial buffer has to be inited to all-ones, but it must restrict it to the size of the first field, not the total field size. After each round in the map search step, the result and the fill map are swapped, so if we have a set where f->bsize of the first element is smaller than m->bsize_max, those one-bits are leaked into future rounds result map. This makes pipapo find an incorrect matching results for sets where first field size is not the largest. Followup patch adds a test case to nft_concat_range.sh selftest script. Thanks to Stefano Brivio for pointing out that we need to zero out the remainder explicitly, only correcting memset() argument isn't enough.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57947 has been rated as a moderate severity vulnerability.
To fix CVE-2024-57947, update your Linux kernel to the latest version where this vulnerability has been resolved.
CVE-2024-57947 affects the netfilter component of the Linux kernel.
The impact of CVE-2024-57947 may lead to improper initialization of buffers, potentially resulting in unstable behavior.
CVE-2024-57947 was disclosed in 2024 during routine security analysis of the Linux kernel.