CVE-2024-26835
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/04/2024
Last modified:
02/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: nf_tables: set dormant flag on hook register failure<br />
<br />
We need to set the dormant flag again if we fail to register<br />
the hooks.<br />
<br />
During memory pressure hook registration can fail and we end up<br />
with a table marked as active but no registered hooks.<br />
<br />
On table/base chain deletion, nf_tables will attempt to unregister<br />
the hook again which yields a warn splat from the nftables core.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.262 (including) | 5.4.270 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.202 (including) | 5.10.211 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 5.15.150 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.80 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.19 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376
- https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af
- https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be
- https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95
- https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7
- https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3
- https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec
- https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069
- https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376
- https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af
- https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be
- https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95
- https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7
- https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3
- https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec
- https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html



