CVE-2024-26925

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path The commit mutex should not be released during the critical section between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC worker could collect expired objects and get the released commit lock within the same GC sequence. nf_tables_module_autoload() temporarily releases the mutex to load module dependencies, then it goes back to replay the transaction again. Move it at the end of the abort phase after nft_gc_seq_end() is called.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2025, 19:10

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:-:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-667
References () https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27 - () https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27 - Patch
References () https://git.kernel.org/stable/c/2cee2ff7f8cce12a63a0a23ffe27f08d99541494 - () https://git.kernel.org/stable/c/2cee2ff7f8cce12a63a0a23ffe27f08d99541494 - Patch
References () https://git.kernel.org/stable/c/61ac7284346c32f9a8c8ceac56102f7914060428 - () https://git.kernel.org/stable/c/61ac7284346c32f9a8c8ceac56102f7914060428 - Patch
References () https://git.kernel.org/stable/c/8038ee3c3e5b59bcd78467686db5270c68544e30 - () https://git.kernel.org/stable/c/8038ee3c3e5b59bcd78467686db5270c68544e30 - Patch
References () https://git.kernel.org/stable/c/8d3a58af50e46167b6f1db47adadad03c0045dae - () https://git.kernel.org/stable/c/8d3a58af50e46167b6f1db47adadad03c0045dae - Patch
References () https://git.kernel.org/stable/c/a34ba4bdeec0c3b629160497594908dc820110f1 - () https://git.kernel.org/stable/c/a34ba4bdeec0c3b629160497594908dc820110f1 - Patch
References () https://git.kernel.org/stable/c/eb769ff4e281f751adcaf4f4445cbf30817be139 - () https://git.kernel.org/stable/c/eb769ff4e281f751adcaf4f4445cbf30817be139 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27 - () https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27 -
References () https://git.kernel.org/stable/c/2cee2ff7f8cce12a63a0a23ffe27f08d99541494 - () https://git.kernel.org/stable/c/2cee2ff7f8cce12a63a0a23ffe27f08d99541494 -
References () https://git.kernel.org/stable/c/61ac7284346c32f9a8c8ceac56102f7914060428 - () https://git.kernel.org/stable/c/61ac7284346c32f9a8c8ceac56102f7914060428 -
References () https://git.kernel.org/stable/c/8038ee3c3e5b59bcd78467686db5270c68544e30 - () https://git.kernel.org/stable/c/8038ee3c3e5b59bcd78467686db5270c68544e30 -
References () https://git.kernel.org/stable/c/8d3a58af50e46167b6f1db47adadad03c0045dae - () https://git.kernel.org/stable/c/8d3a58af50e46167b6f1db47adadad03c0045dae -
References () https://git.kernel.org/stable/c/a34ba4bdeec0c3b629160497594908dc820110f1 - () https://git.kernel.org/stable/c/a34ba4bdeec0c3b629160497594908dc820110f1 -
References () https://git.kernel.org/stable/c/eb769ff4e281f751adcaf4f4445cbf30817be139 - () https://git.kernel.org/stable/c/eb769ff4e281f751adcaf4f4445cbf30817be139 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 21:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

13 May 2024, 08:15

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/05/07/6', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/05/08/2', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

08 May 2024, 15:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/05/08/2 -

07 May 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/05/07/6 -

25 Apr 2024, 13:18

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_tables: libera mutex después de nft_gc_seq_end de la ruta de cancelación. El mutex de confirmación no debe liberarse durante la sección crítica entre nft_gc_seq_begin() y nft_gc_seq_end(); de lo contrario, el trabajador asíncrono de GC podría recopilar objetos caducados y obtener el bloqueo de confirmación liberado dentro de la misma secuencia de GC. nf_tables_module_autoload() libera temporalmente el mutex para cargar las dependencias del módulo, luego vuelve a reproducir la transacción nuevamente. Muévalo al final de la fase de cancelación después de llamar a nft_gc_seq_end().

25 Apr 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-25 06:15

Updated : 2025-12-23 19:10


NVD link : CVE-2024-26925

Mitre link : CVE-2024-26925

CVE.ORG link : CVE-2024-26925


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-667

Improper Locking