CVE-2024-26668
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
02/04/2024
Last modified:
17/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: nft_limit: reject configurations that cause integer overflow<br />
<br />
Reject bogus configs where internal token counter wraps around.<br />
This only occurs with very very large requests, such as 17gbyte/s.<br />
<br />
Its better to reject this rather than having incorrect ratelimit.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.3 (including) | 5.15.149 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.76 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/00c2c29aa36d1d1827c51a3720e9f893a22c7c6a
- https://git.kernel.org/stable/c/79d4efd75e7dbecd855a3b8a63e65f7265f466e1
- https://git.kernel.org/stable/c/9882495d02ecc490604f747437a40626dc9160d0
- https://git.kernel.org/stable/c/bc6e242bb74e2ae616bfd2b250682b738e781c9b
- https://git.kernel.org/stable/c/c9d9eb9c53d37cdebbad56b91e40baf42d5a97aa
- https://git.kernel.org/stable/c/00c2c29aa36d1d1827c51a3720e9f893a22c7c6a
- https://git.kernel.org/stable/c/79d4efd75e7dbecd855a3b8a63e65f7265f466e1
- https://git.kernel.org/stable/c/9882495d02ecc490604f747437a40626dc9160d0
- https://git.kernel.org/stable/c/bc6e242bb74e2ae616bfd2b250682b738e781c9b
- https://git.kernel.org/stable/c/c9d9eb9c53d37cdebbad56b91e40baf42d5a97aa



