CVE-2024-26835

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: set dormant flag on hook register failure We need to set the dormant flag again if we fail to register the hooks. During memory pressure hook registration can fail and we end up with a table marked as active but no registered hooks. On table/base chain deletion, nf_tables will attempt to unregister the hook again which yields a warn splat from the nftables core.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

02 Apr 2025, 13:18

Type Values Removed Values Added
First Time Debian
Linux linux Kernel
Debian debian Linux
Linux
References () https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376 - () https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376 - Patch
References () https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af - () https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af - Patch
References () https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be - () https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be - Patch
References () https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95 - () https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95 - Patch
References () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 - () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 - Patch
References () https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3 - () https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3 - Patch
References () https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec - () https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec - Patch
References () https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069 - () https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376 - () https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376 -
References () https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af - () https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af -
References () https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be - () https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be -
References () https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95 - () https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95 -
References () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 - () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 -
References () https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3 - () https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3 -
References () https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec - () https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec -
References () https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069 - () https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069 -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

16 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_tables: establece el indicador inactivo en caso de error en el registro del enlace. Necesitamos configurar el indicador inactivo nuevamente si no logramos registrar los enlaces. Durante la presión de la memoria, el registro de ganchos puede fallar y terminamos con una tabla marcada como activa pero sin ganchos registrados. Al eliminar la tabla/cadena base, nf_tables intentará cancelar el registro del gancho nuevamente, lo que genera un símbolo de advertencia desde el núcleo de nftables.

17 Apr 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 10:15

Updated : 2025-04-02 13:18


NVD link : CVE-2024-26835

Mitre link : CVE-2024-26835

CVE.ORG link : CVE-2024-26835


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel