CVE-2024-27018 — Path Traversal in Linux
Severity
7.8HIGHNVD
GHSA8.2
EPSS
0.0%
top 98.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 1
Latest updateMar 30
Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: br_netfilter: skip conntrack input hook for promisc packets
For historical reasons, when bridge device is in promisc mode, packets
that are directed to the taps follow bridge input hook path. This patch
adds a workaround to reset conntrack for these packets.
Jianbo Liu reports warning splats in their test infrastructure where
cloned packets reach the br_netfilter input hook to confirm the
conntrack object.
Scratch…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages3 packages
▶CVEListV5linux/linux7c3f28599652acf431a2211168de4a583f30b6d5 — dceb683ab87ca3666a9bb5c0158528b646faedc4+6
Also affects: Fedora 38, 39, 40
Patches
🔴Vulnerability Details
4GHSA▶
Gotenberg has Chromium deny-list bypass via case-insensitive URL scheme (bypass of GHSA-rh2x-ccvw-q7r3)↗2026-03-30
OSV▶
CVE-2024-27018: In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: skip conntrack input hook for promisc packets For histori↗2024-05-01
GHSA▶
GHSA-cm9x-gp4m-whg8: In the Linux kernel, the following vulnerability has been resolved:
netfilter: br_netfilter: skip conntrack input hook for promisc packets
For histo↗2024-05-01
📋Vendor Advisories
14💬Community
1Bugzilla▶
CVE-2024-27018 kernel: netfilter: br_netfilter: skip conntrack input hook for promisc packets↗2024-05-01