In the Linux kernel, the following vulnerability has been resolved:
netfilter: ctnetlink: use helper function to calculate expect ID
Delete expectation path is missing a call to the nfexpectget_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.
[
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e2c24f7b0911b15c29aefce760bcf770542fb61",
"signature_type": "Line",
"target": {
"file": "net/netfilter/nf_conntrack_netlink.c"
},
"id": "CVE-2024-44944-1a8ec4c9",
"digest": {
"line_hashes": [
"308562163487860599269184259644121446732",
"213222525222991824890589144894586326215",
"82803472965168152557686158798059904706",
"51073141721299142923236624638450022540"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@27662b46f2adaa52c1665a82af4b21c42c4337fd",
"signature_type": "Line",
"target": {
"file": "net/netfilter/nf_conntrack_netlink.c"
},
"id": "CVE-2024-44944-7bc0f283",
"digest": {
"line_hashes": [
"308562163487860599269184259644121446732",
"213222525222991824890589144894586326215",
"82803472965168152557686158798059904706",
"51073141721299142923236624638450022540"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@66e7650dbbb8e236e781c670b167edc81e771450",
"signature_type": "Line",
"target": {
"file": "net/netfilter/nf_conntrack_netlink.c"
},
"id": "CVE-2024-44944-9b390277",
"digest": {
"line_hashes": [
"308562163487860599269184259644121446732",
"213222525222991824890589144894586326215",
"82803472965168152557686158798059904706",
"51073141721299142923236624638450022540"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@64c0b8e64be8368617ef08dfc59a3160563a1435",
"signature_type": "Line",
"target": {
"file": "net/netfilter/nf_conntrack_netlink.c"
},
"id": "CVE-2024-44944-a9456bcd",
"digest": {
"line_hashes": [
"308562163487860599269184259644121446732",
"213222525222991824890589144894586326215",
"82803472965168152557686158798059904706",
"51073141721299142923236624638450022540"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74de442b8e12a207c07953ee068009a7701aff8f",
"signature_type": "Line",
"target": {
"file": "net/netfilter/nf_conntrack_netlink.c"
},
"id": "CVE-2024-44944-ce1210f0",
"digest": {
"line_hashes": [
"308562163487860599269184259644121446732",
"213222525222991824890589144894586326215",
"82803472965168152557686158798059904706",
"51073141721299142923236624638450022540"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@782161895eb4ac45cf7cfa8db375bd4766cb8299",
"signature_type": "Line",
"target": {
"file": "net/netfilter/nf_conntrack_netlink.c"
},
"id": "CVE-2024-44944-f18300f6",
"digest": {
"line_hashes": [
"308562163487860599269184259644121446732",
"213222525222991824890589144894586326215",
"82803472965168152557686158798059904706",
"51073141721299142923236624638450022540"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@24f407042cf90b0872de667460230d8d50c06c39",
"signature_type": "Line",
"target": {
"file": "net/netfilter/nf_conntrack_netlink.c"
},
"id": "CVE-2024-44944-ff60640c",
"digest": {
"line_hashes": [
"308562163487860599269184259644121446732",
"213222525222991824890589144894586326215",
"82803472965168152557686158798059904706",
"51073141721299142923236624638450022540"
],
"threshold": 0.9
},
"deprecated": false
}
]