In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
register store validation for NFT_DATA_VALUE is conditional, however,
the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This
only requires a new helper function to infer the register type from the
set datatype so this conditional check can be removed. Otherwise,
pointer to chain object can be leaked through the registers.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4 - Patch | |
References | () https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f - Patch | |
References | () https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f - Patch | |
References | () https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8 - Patch | |
References | () https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf - Patch | |
References | () https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c - Patch | |
References | () https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564 - Patch | |
References | () https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007 - Patch |
30 Jul 2024, 19:01
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-401 | |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4 - Patch | |
References | () https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f - Patch | |
References | () https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f - Patch | |
References | () https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8 - Patch | |
References | () https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf - Patch | |
References | () https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c - Patch | |
References | () https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564 - Patch | |
References | () https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007 - Patch | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
29 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 16:15
Updated : 2024-11-21 09:33
NVD link : CVE-2024-42070
Mitre link : CVE-2024-42070
CVE.ORG link : CVE-2024-42070
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime