Lucene search

K
cveLinuxCVE-2024-42070
HistoryJul 29, 2024 - 4:15 p.m.

CVE-2024-42070

2024-07-2916:15:06
CWE-401
Linux
web.nvd.nist.gov
82
linux kernel
netfilter
nf_tables
vulnerability
data registers
datatype
helper function
pointer leakage

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

5.0%

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers

register store validation for NFT_DATA_VALUE is conditional, however,
the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This
only requires a new helper function to infer the register type from the
set datatype so this conditional check can be removed. Otherwise,
pointer to chain object can be leaked through the registers.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange<3.13
OR
linuxlinux_kernelRange3.144.19.317
OR
linuxlinux_kernelRange4.205.4.279
OR
linuxlinux_kernelRange5.55.10.221
OR
linuxlinux_kernelRange5.115.15.162
OR
linuxlinux_kernelRange5.166.1.97
OR
linuxlinux_kernelRange6.26.6.37
OR
linuxlinux_kernelRange6.76.9.8
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "include/net/netfilter/nf_tables.h",
      "net/netfilter/nf_tables_api.c",
      "net/netfilter/nft_lookup.c"
    ],
    "versions": [
      {
        "version": "96518518cc41",
        "lessThan": "40188a25a984",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "96518518cc41",
        "lessThan": "23752737c6a6",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "96518518cc41",
        "lessThan": "5d43d789b579",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "96518518cc41",
        "lessThan": "461302e07f49",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "96518518cc41",
        "lessThan": "efb27ad05949",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "96518518cc41",
        "lessThan": "952bf8df2225",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "96518518cc41",
        "lessThan": "41a6375d48de",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "96518518cc41",
        "lessThan": "7931d32955e0",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "include/net/netfilter/nf_tables.h",
      "net/netfilter/nf_tables_api.c",
      "net/netfilter/nft_lookup.c"
    ],
    "versions": [
      {
        "version": "3.13",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "3.13",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.317",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.279",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.221",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.162",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.97",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.37",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9.8",
        "lessThanOrEqual": "6.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

5.0%