Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-42070— netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers

EPSS 0.01% · P3

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinux96518518cc417bb0a8c80b9fb736202e28acdf96< 40188a25a9847dbeb7ec67517174a835a677752faffected
96518518cc417bb0a8c80b9fb736202e28acdf96< 23752737c6a618e994f9a310ec2568881a6b49c4affected
96518518cc417bb0a8c80b9fb736202e28acdf96< 5d43d789b57943720dca4181a05f6477362b94cfaffected
96518518cc417bb0a8c80b9fb736202e28acdf96< 461302e07f49687ffe7d105fa0a330c07c7646d8affected
96518518cc417bb0a8c80b9fb736202e28acdf96< efb27ad05949403848f487823b597ed67060e007affected
96518518cc417bb0a8c80b9fb736202e28acdf96< 952bf8df222599baadbd4f838a49c4fef81d2564affected
96518518cc417bb0a8c80b9fb736202e28acdf96< 41a6375d48deaf7f730304b5153848bfa1c2980faffected
96518518cc417bb0a8c80b9fb736202e28acdf96< 7931d32955e09d0a11b1fe0b6aac1bfa061c005caffected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-42070

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This only requires a new helper function to infer the register type from the set datatype so this conditional check can be removed. Otherwise, pointer to chain object can be leaked through the registers.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于可以通过寄存器泄露链表对象的指针。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 96518518cc417bb0a8c80b9fb736202e28acdf96 ~ 40188a25a9847dbeb7ec67517174a835a677752f -
LinuxLinux 3.13 -

II. Public POCs for CVE-2024-42070

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-42070

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-07-29 · 121 CVEs total

CVE-2024-41088can: mcp251xfd: fix infinite loop when xmit fails
CVE-2024-42067bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro()
CVE-2024-42066drm/xe: Fix potential integer overflow in page size calculation
CVE-2024-42065drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init
CVE-2024-42063bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
CVE-2024-42064drm/amd/display: Skip pipe if the pipe idx not set properly
CVE-2023-52887net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_s
CVE-2024-41098ata: libata-core: Fix null pointer dereference on error
CVE-2024-41097usb: atm: cxacru: fix endpoint checking in cxacru_bind()
CVE-2024-41096PCI/MSI: Fix UAF in msi_capability_init
CVE-2024-41095drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
CVE-2024-41094drm/fbdev-dma: Only set smem_start is enable per module option
CVE-2024-41093drm/amdgpu: avoid using null object of framebuffer
CVE-2024-41092drm/i915/gt: Fix potential UAF by revoke of fence registers
CVE-2024-41089drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
CVE-2024-41077null_blk: fix validation of block size
CVE-2024-41080io_uring: fix possible deadlock in io_register_iowq_max_workers()
CVE-2024-41079nvmet: always initialize cqe.result
CVE-2024-41078btrfs: qgroup: fix quota root leak after quota disable failure
CVE-2024-41075cachefiles: add consistency check for copen/cread

Showing top 20 of 121 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-42070

No comments yet


Leave a comment