In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This only requires a new helper function to infer the register type from the set datatype so this conditional check can be removed. Otherwise, pointer to chain object can be leaked through the registers.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2024072952-CVE-2024-42070-b271@gregkh/T
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2301703]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:8870 https://access.redhat.com/errata/RHSA-2024:8870
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:8856 https://access.redhat.com/errata/RHSA-2024:8856
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:9315 https://access.redhat.com/errata/RHSA-2024:9315
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:4342 https://access.redhat.com/errata/RHSA-2025:4342