{"id":"CVE-2024-42070","summary":"netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers\n\nregister store validation for NFT_DATA_VALUE is conditional, however,\nthe datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This\nonly requires a new helper function to infer the register type from the\nset datatype so this conditional check can be removed. Otherwise,\npointer to chain object can be leaked through the registers.","modified":"2026-04-02T12:17:40.508043Z","published":"2024-07-29T15:52:34.061Z","related":["ALSA-2024:8856","ALSA-2024:8870","SUSE-SU-2024:2892-1","SUSE-SU-2024:2894-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2940-1","SUSE-SU-2024:2947-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3383-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42070.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564"},{"type":"WEB","url":"https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42070.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42070"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"96518518cc417bb0a8c80b9fb736202e28acdf96"},{"fixed":"40188a25a9847dbeb7ec67517174a835a677752f"},{"fixed":"23752737c6a618e994f9a310ec2568881a6b49c4"},{"fixed":"5d43d789b57943720dca4181a05f6477362b94cf"},{"fixed":"461302e07f49687ffe7d105fa0a330c07c7646d8"},{"fixed":"efb27ad05949403848f487823b597ed67060e007"},{"fixed":"952bf8df222599baadbd4f838a49c4fef81d2564"},{"fixed":"41a6375d48deaf7f730304b5153848bfa1c2980f"},{"fixed":"7931d32955e09d0a11b1fe0b6aac1bfa061c005c"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42070.json"}}],"schema_version":"1.7.5"}