CVE-2024-41042
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
29/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: nf_tables: prefer nft_chain_validate<br />
<br />
nft_chain_validate already performs loop detection because a cycle will<br />
result in a call stack overflow (ctx->level >= NFT_JUMP_STACK_SIZE).<br />
<br />
It also follows maps via ->validate callback in nft_lookup, so there<br />
appears no reason to iterate the maps again.<br />
<br />
nf_tables_check_loops() and all its helper functions can be removed.<br />
This improves ruleset load time significantly, from 23s down to 12s.<br />
<br />
This also fixes a crash bug. Old loop detection code can result in<br />
unbounded recursion:<br />
<br />
BUG: TASK stack guard page was hit at ....<br />
Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN<br />
CPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1<br />
[..]<br />
<br />
with a suitable ruleset during validation of register stores.<br />
<br />
I can&#39;t see any actual reason to attempt to check for this from<br />
nft_validate_register_store(), at this point the transaction is still in<br />
progress, so we don&#39;t have a full picture of the rule graph.<br />
<br />
For nf-next it might make sense to either remove it or make this depend<br />
on table->validate_state in case we could catch an error earlier<br />
(for improved error reporting to userspace).
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.13 (including) | 4.19.320 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.282 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.224 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.165 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.105 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.46 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1947e4c3346faa8ac7e343652c0fd3b3e394202f
- https://git.kernel.org/stable/c/31c35f9f89ef585f1edb53e17ac73a0ca4a9712b
- https://git.kernel.org/stable/c/717c91c6ed73e248de6a15bc53adefb81446c9d0
- https://git.kernel.org/stable/c/8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e
- https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae
- https://git.kernel.org/stable/c/b6b6e430470e1c3c5513311cb35a15a205595abe
- https://git.kernel.org/stable/c/cd4348e0a50286282c314ad6d2b0740e7c812c24
- https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c
- https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae
- https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c
- https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



