CVE-2024-42070 (GCVE-0-2024-42070)
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2025-11-03 22:01
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This only requires a new helper function to infer the register type from the set datatype so this conditional check can be removed. Otherwise, pointer to chain object can be leaked through the registers.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007 Patch
af854a3a-2127-422b-91ae-364da2661108 https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Impacted products
Vendor Product Version
Linux Linux Version: 96518518cc417bb0a8c80b9fb736202e28acdf96
Version: 96518518cc417bb0a8c80b9fb736202e28acdf96
Version: 96518518cc417bb0a8c80b9fb736202e28acdf96
Version: 96518518cc417bb0a8c80b9fb736202e28acdf96
Version: 96518518cc417bb0a8c80b9fb736202e28acdf96
Version: 96518518cc417bb0a8c80b9fb736202e28acdf96
Version: 96518518cc417bb0a8c80b9fb736202e28acdf96
Version: 96518518cc417bb0a8c80b9fb736202e28acdf96
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T22:01:06.928Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42070",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:19:46.237204Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:08.190Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "include/net/netfilter/nf_tables.h",
            "net/netfilter/nf_tables_api.c",
            "net/netfilter/nft_lookup.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "40188a25a9847dbeb7ec67517174a835a677752f",
              "status": "affected",
              "version": "96518518cc417bb0a8c80b9fb736202e28acdf96",
              "versionType": "git"
            },
            {
              "lessThan": "23752737c6a618e994f9a310ec2568881a6b49c4",
              "status": "affected",
              "version": "96518518cc417bb0a8c80b9fb736202e28acdf96",
              "versionType": "git"
            },
            {
              "lessThan": "5d43d789b57943720dca4181a05f6477362b94cf",
              "status": "affected",
              "version": "96518518cc417bb0a8c80b9fb736202e28acdf96",
              "versionType": "git"
            },
            {
              "lessThan": "461302e07f49687ffe7d105fa0a330c07c7646d8",
              "status": "affected",
              "version": "96518518cc417bb0a8c80b9fb736202e28acdf96",
              "versionType": "git"
            },
            {
              "lessThan": "efb27ad05949403848f487823b597ed67060e007",
              "status": "affected",
              "version": "96518518cc417bb0a8c80b9fb736202e28acdf96",
              "versionType": "git"
            },
            {
              "lessThan": "952bf8df222599baadbd4f838a49c4fef81d2564",
              "status": "affected",
              "version": "96518518cc417bb0a8c80b9fb736202e28acdf96",
              "versionType": "git"
            },
            {
              "lessThan": "41a6375d48deaf7f730304b5153848bfa1c2980f",
              "status": "affected",
              "version": "96518518cc417bb0a8c80b9fb736202e28acdf96",
              "versionType": "git"
            },
            {
              "lessThan": "7931d32955e09d0a11b1fe0b6aac1bfa061c005c",
              "status": "affected",
              "version": "96518518cc417bb0a8c80b9fb736202e28acdf96",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "include/net/netfilter/nf_tables.h",
            "net/netfilter/nf_tables_api.c",
            "net/netfilter/nft_lookup.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.13"
            },
            {
              "lessThan": "3.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.317",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.279",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.221",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.162",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.97",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.37",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.9.*",
              "status": "unaffected",
              "version": "6.9.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.10",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.317",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.279",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.221",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.162",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.97",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.37",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.9.8",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers\n\nregister store validation for NFT_DATA_VALUE is conditional, however,\nthe datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This\nonly requires a new helper function to infer the register type from the\nset datatype so this conditional check can be removed. Otherwise,\npointer to chain object can be leaked through the registers."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T09:22:18.843Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f"
        },
        {
          "url": "https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4"
        },
        {
          "url": "https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf"
        },
        {
          "url": "https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8"
        },
        {
          "url": "https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007"
        },
        {
          "url": "https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564"
        },
        {
          "url": "https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f"
        },
        {
          "url": "https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c"
        }
      ],
      "title": "netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-42070",
    "datePublished": "2024-07-29T15:52:34.061Z",
    "dateReserved": "2024-07-29T15:50:41.168Z",
    "dateUpdated": "2025-11-03T22:01:06.928Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-42070\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-29T16:15:06.540\",\"lastModified\":\"2025-11-03T22:17:35.020\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers\\n\\nregister store validation for NFT_DATA_VALUE is conditional, however,\\nthe datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This\\nonly requires a new helper function to infer the register type from the\\nset datatype so this conditional check can be removed. Otherwise,\\npointer to chain object can be leaked through the registers.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nf_tables: validar completamente NFT_DATA_VALUE en la tienda para registros de datos. La validaci\u00f3n de la tienda para NFT_DATA_VALUE es condicional; sin embargo, el tipo de datos siempre es NFT_DATA_VALUE o NFT_DATA_VERDICT. Esto solo requiere una nueva funci\u00f3n auxiliar para inferir el tipo de registro a partir del tipo de datos establecido para que se pueda eliminar esta verificaci\u00f3n condicional. De lo contrario, el puntero al objeto de la cadena se puede filtrar a trav\u00e9s de los registros.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.13\",\"matchCriteriaId\":\"E37CAD46-6582-4D99-9D51-C217F9083FC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.14\",\"versionEndExcluding\":\"4.19.317\",\"matchCriteriaId\":\"94AD7CE0-1AB3-4F0C-9642-209112A5ECB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.279\",\"matchCriteriaId\":\"F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.221\",\"matchCriteriaId\":\"659E1520-6345-41AF-B893-A7C0647585A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.162\",\"matchCriteriaId\":\"10A39ACC-3005-40E8-875C-98A372D1FFD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.97\",\"matchCriteriaId\":\"748B6C4B-1F61-47F9-96CC-8899B8412D84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.37\",\"matchCriteriaId\":\"D72E033B-5323-4C4D-8818-36E1EBC3535F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.9.8\",\"matchCriteriaId\":\"E95105F2-32E3-4C5F-9D18-7AEFD0E6275C\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T04:54:31.272Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-42070\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:19:46.237204Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:14.709Z\"}}], \"cna\": {\"title\": \"netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"96518518cc417bb0a8c80b9fb736202e28acdf96\", \"lessThan\": \"40188a25a9847dbeb7ec67517174a835a677752f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"96518518cc417bb0a8c80b9fb736202e28acdf96\", \"lessThan\": \"23752737c6a618e994f9a310ec2568881a6b49c4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"96518518cc417bb0a8c80b9fb736202e28acdf96\", \"lessThan\": \"5d43d789b57943720dca4181a05f6477362b94cf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"96518518cc417bb0a8c80b9fb736202e28acdf96\", \"lessThan\": \"461302e07f49687ffe7d105fa0a330c07c7646d8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"96518518cc417bb0a8c80b9fb736202e28acdf96\", \"lessThan\": \"efb27ad05949403848f487823b597ed67060e007\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"96518518cc417bb0a8c80b9fb736202e28acdf96\", \"lessThan\": \"952bf8df222599baadbd4f838a49c4fef81d2564\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"96518518cc417bb0a8c80b9fb736202e28acdf96\", \"lessThan\": \"41a6375d48deaf7f730304b5153848bfa1c2980f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"96518518cc417bb0a8c80b9fb736202e28acdf96\", \"lessThan\": \"7931d32955e09d0a11b1fe0b6aac1bfa061c005c\", \"versionType\": \"git\"}], \"programFiles\": [\"include/net/netfilter/nf_tables.h\", \"net/netfilter/nf_tables_api.c\", \"net/netfilter/nft_lookup.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.13\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.13\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.317\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.279\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.221\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.162\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.97\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.37\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"include/net/netfilter/nf_tables.h\", \"net/netfilter/nf_tables_api.c\", \"net/netfilter/nft_lookup.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f\"}, {\"url\": \"https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4\"}, {\"url\": \"https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf\"}, {\"url\": \"https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8\"}, {\"url\": \"https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007\"}, {\"url\": \"https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564\"}, {\"url\": \"https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f\"}, {\"url\": \"https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers\\n\\nregister store validation for NFT_DATA_VALUE is conditional, however,\\nthe datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This\\nonly requires a new helper function to infer the register type from the\\nset datatype so this conditional check can be removed. Otherwise,\\npointer to chain object can be leaked through the registers.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.317\", \"versionStartIncluding\": \"3.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.279\", \"versionStartIncluding\": \"3.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.221\", \"versionStartIncluding\": \"3.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.162\", \"versionStartIncluding\": \"3.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.97\", \"versionStartIncluding\": \"3.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.37\", \"versionStartIncluding\": \"3.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.9.8\", \"versionStartIncluding\": \"3.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10\", \"versionStartIncluding\": \"3.13\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:22:18.843Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-42070\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:22:18.843Z\", \"dateReserved\": \"2024-07-29T15:50:41.168Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-29T15:52:34.061Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}