CVE-2024-35897

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: discard table flag update with pending basechain deletion Hook unregistration is deferred to the commit phase, same occurs with hook updates triggered by the table dormant flag. When both commands are combined, this results in deleting a basechain while leaving its hook still registered in the core.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

17 Dec 2025, 03:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1bc83a019bbe268be3526406245ec28c2458a518 - () https://git.kernel.org/stable/c/1bc83a019bbe268be3526406245ec28c2458a518 - Patch
References () https://git.kernel.org/stable/c/2aeb805a1bcd5f27c8c0d1a9d4d653f16d1506f4 - () https://git.kernel.org/stable/c/2aeb805a1bcd5f27c8c0d1a9d4d653f16d1506f4 - Patch
References () https://git.kernel.org/stable/c/6cbbe1ba76ee7e674a86abd43009b083a45838cb - () https://git.kernel.org/stable/c/6cbbe1ba76ee7e674a86abd43009b083a45838cb - Patch
References () https://git.kernel.org/stable/c/7f609f630951b624348373cef99991ce08831927 - () https://git.kernel.org/stable/c/7f609f630951b624348373cef99991ce08831927 - Patch
References () https://git.kernel.org/stable/c/9627fd0c6ea1c446741a33e67bc5709c59923827 - () https://git.kernel.org/stable/c/9627fd0c6ea1c446741a33e67bc5709c59923827 - Patch
References () https://git.kernel.org/stable/c/9a3b90904d8a072287480eed4c3ece4b99d64f78 - () https://git.kernel.org/stable/c/9a3b90904d8a072287480eed4c3ece4b99d64f78 - Patch
References () https://git.kernel.org/stable/c/b58d0ac35f6d75ec1db8650a29dfd6f292c11362 - () https://git.kernel.org/stable/c/b58d0ac35f6d75ec1db8650a29dfd6f292c11362 - Patch
References () https://git.kernel.org/stable/c/e75faf01e22ec7dc671640fa0e0968964fafd2fc - () https://git.kernel.org/stable/c/e75faf01e22ec7dc671640fa0e0968964fafd2fc - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory, Mailing List
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

21 Nov 2024, 09:21

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/1bc83a019bbe268be3526406245ec28c2458a518 - () https://git.kernel.org/stable/c/1bc83a019bbe268be3526406245ec28c2458a518 -
References () https://git.kernel.org/stable/c/2aeb805a1bcd5f27c8c0d1a9d4d653f16d1506f4 - () https://git.kernel.org/stable/c/2aeb805a1bcd5f27c8c0d1a9d4d653f16d1506f4 -
References () https://git.kernel.org/stable/c/6cbbe1ba76ee7e674a86abd43009b083a45838cb - () https://git.kernel.org/stable/c/6cbbe1ba76ee7e674a86abd43009b083a45838cb -
References () https://git.kernel.org/stable/c/7f609f630951b624348373cef99991ce08831927 - () https://git.kernel.org/stable/c/7f609f630951b624348373cef99991ce08831927 -
References () https://git.kernel.org/stable/c/9627fd0c6ea1c446741a33e67bc5709c59923827 - () https://git.kernel.org/stable/c/9627fd0c6ea1c446741a33e67bc5709c59923827 -
References () https://git.kernel.org/stable/c/9a3b90904d8a072287480eed4c3ece4b99d64f78 - () https://git.kernel.org/stable/c/9a3b90904d8a072287480eed4c3ece4b99d64f78 -
References () https://git.kernel.org/stable/c/b58d0ac35f6d75ec1db8650a29dfd6f292c11362 - () https://git.kernel.org/stable/c/b58d0ac35f6d75ec1db8650a29dfd6f292c11362 -
References () https://git.kernel.org/stable/c/e75faf01e22ec7dc671640fa0e0968964fafd2fc - () https://git.kernel.org/stable/c/e75faf01e22ec7dc671640fa0e0968964fafd2fc -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

16 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/e75faf01e22ec7dc671640fa0e0968964fafd2fc -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: netfilter: nf_tables: descartar actualización del indicador de tabla con eliminación pendiente de la cadena base. La cancelación del registro del gancho se difiere hasta la fase de confirmación; lo mismo ocurre con las actualizaciones del gancho activadas por el indicador inactivo de la tabla. Cuando se combinan ambos comandos, esto da como resultado la eliminación de una cadena base y deja su gancho aún registrado en el núcleo.

19 May 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-19 09:15

Updated : 2025-12-17 03:42


NVD link : CVE-2024-35897

Mitre link : CVE-2024-35897

CVE.ORG link : CVE-2024-35897


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel