In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
register store validation for NFT_DATA_VALUE is conditional, however,
the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This
only requires a new helper function to infer the register type from the
set datatype so this conditional check can be removed. Otherwise,
pointer to chain object can be leaked through the registers.
References
Configurations
Configuration 1 (hide)
|
History
30 Jul 2024, 19:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-401 | |
Summary |
|
|
References | () https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4 - Patch | |
References | () https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f - Patch | |
References | () https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f - Patch | |
References | () https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8 - Patch | |
References | () https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf - Patch | |
References | () https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c - Patch | |
References | () https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564 - Patch | |
References | () https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007 - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
29 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 16:15
Updated : 2024-07-30 19:01
NVD link : CVE-2024-42070
Mitre link : CVE-2024-42070
CVE.ORG link : CVE-2024-42070
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime