{"id":"CVE-2024-41042","summary":"netfilter: nf_tables: prefer nft_chain_validate","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: prefer nft_chain_validate\n\nnft_chain_validate already performs loop detection because a cycle will\nresult in a call stack overflow (ctx-\u003elevel \u003e= NFT_JUMP_STACK_SIZE).\n\nIt also follows maps via -\u003evalidate callback in nft_lookup, so there\nappears no reason to iterate the maps again.\n\nnf_tables_check_loops() and all its helper functions can be removed.\nThis improves ruleset load time significantly, from 23s down to 12s.\n\nThis also fixes a crash bug. Old loop detection code can result in\nunbounded recursion:\n\nBUG: TASK stack guard page was hit at ....\nOops: stack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1\n[..]\n\nwith a suitable ruleset during validation of register stores.\n\nI can't see any actual reason to attempt to check for this from\nnft_validate_register_store(), at this point the transaction is still in\nprogress, so we don't have a full picture of the rule graph.\n\nFor nf-next it might make sense to either remove it or make this depend\non table-\u003evalidate_state in case we could catch an error earlier\n(for improved error reporting to userspace).","modified":"2026-03-20T12:37:29.657723Z","published":"2024-07-29T14:31:55.530Z","related":["ALSA-2024:8856","ALSA-2024:8870","SUSE-SU-2024:3190-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3483-1","SUSE-SU-2025:0117-1","SUSE-SU-2025:0153-1","SUSE-SU-2025:0154-1","SUSE-SU-2025:0289-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/41xxx/CVE-2024-41042.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1947e4c3346faa8ac7e343652c0fd3b3e394202f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/31c35f9f89ef585f1edb53e17ac73a0ca4a9712b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/717c91c6ed73e248de6a15bc53adefb81446c9d0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b6b6e430470e1c3c5513311cb35a15a205595abe"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cd4348e0a50286282c314ad6d2b0740e7c812c24"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/41xxx/CVE-2024-41042.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41042"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"20a69341f2d00cd042e81c82289fba8a13c05a25"},{"fixed":"1947e4c3346faa8ac7e343652c0fd3b3e394202f"},{"fixed":"cd4348e0a50286282c314ad6d2b0740e7c812c24"},{"fixed":"31c35f9f89ef585f1edb53e17ac73a0ca4a9712b"},{"fixed":"8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e"},{"fixed":"b6b6e430470e1c3c5513311cb35a15a205595abe"},{"fixed":"717c91c6ed73e248de6a15bc53adefb81446c9d0"},{"fixed":"9df785aeb7dcc8efd1d4110bb27d26005298ebae"},{"fixed":"cff3bd012a9512ac5ed858d38e6ed65f6391008c"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-41042.json"}}],"schema_version":"1.7.5"}