In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.
- Disallow layer 4 protocol with no ports, since destination port is a
mandatory attribute for this object.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Mar 2025, 15:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* |
|
First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
CWE | NVD-CWE-noinfo | |
References | () https://git.kernel.org/stable/c/0f501dae16b7099e69ee9b0d5c70b8f40fd30e98 - Patch | |
References | () https://git.kernel.org/stable/c/38cc1605338d99205a263707f4dde76408d3e0e8 - Patch | |
References | () https://git.kernel.org/stable/c/65ee90efc928410c6f73b3d2e0afdd762652c09d - Patch | |
References | () https://git.kernel.org/stable/c/8059918a1377f2f1fff06af4f5a4ed3d5acd6bc4 - Patch | |
References | () https://git.kernel.org/stable/c/b775ced05489f4b77a35fe203e9aeb22f428e38f - Patch | |
References | () https://git.kernel.org/stable/c/cfe3550ea5df292c9e2d608e8c4560032391847e - Patch | |
References | () https://git.kernel.org/stable/c/f549f340c91f08b938d60266e792ff7748dae483 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List |
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/0f501dae16b7099e69ee9b0d5c70b8f40fd30e98 - | |
References | () https://git.kernel.org/stable/c/38cc1605338d99205a263707f4dde76408d3e0e8 - | |
References | () https://git.kernel.org/stable/c/65ee90efc928410c6f73b3d2e0afdd762652c09d - | |
References | () https://git.kernel.org/stable/c/8059918a1377f2f1fff06af4f5a4ed3d5acd6bc4 - | |
References | () https://git.kernel.org/stable/c/b775ced05489f4b77a35fe203e9aeb22f428e38f - | |
References | () https://git.kernel.org/stable/c/cfe3550ea5df292c9e2d608e8c4560032391847e - | |
References | () https://git.kernel.org/stable/c/f549f340c91f08b938d60266e792ff7748dae483 - |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Apr 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-02 07:15
Updated : 2025-03-17 15:43
NVD link : CVE-2024-26673
Mitre link : CVE-2024-26673
CVE.ORG link : CVE-2024-26673
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE