In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: set dormant flag on hook register failure
We need to set the dormant flag again if we fail to register
the hooks.
During memory pressure hook registration can fail and we end up
with a table marked as active but no registered hooks.
On table/base chain deletion, nf_tables will attempt to unregister
the hook again which yields a warn splat from the nftables core.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
02 Apr 2025, 13:18
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian
Linux linux Kernel Debian debian Linux Linux |
|
References | () https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376 - Patch | |
References | () https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af - Patch | |
References | () https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be - Patch | |
References | () https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95 - Patch | |
References | () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 - Patch | |
References | () https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3 - Patch | |
References | () https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec - Patch | |
References | () https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376 - | |
References | () https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af - | |
References | () https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be - | |
References | () https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95 - | |
References | () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 - | |
References | () https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3 - | |
References | () https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec - | |
References | () https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069 - |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jun 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
17 Apr 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-17 10:15
Updated : 2025-04-02 13:18
NVD link : CVE-2024-26835
Mitre link : CVE-2024-26835
CVE.ORG link : CVE-2024-26835
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE