CVE-2024-35900

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject new basechain after table flag update When dormant flag is toggled, hooks are disabled in the commit phase by iterating over current chains in table (existing and new). The following configuration allows for an inconsistent state: add table x add chain x y { type filter hook input priority 0; } add table x { flags dormant; } add chain x w { type filter hook input priority 1; } which triggers the following warning when trying to unregister chain w which is already unregistered. [ 127.322252] WARNING: CPU: 7 PID: 1211 at net/netfilter/core.c:50 1 __nf_unregister_net_hook+0x21a/0x260 [...] [ 127.322519] Call Trace: [ 127.322521] <TASK> [ 127.322524] ? __warn+0x9f/0x1a0 [ 127.322531] ? __nf_unregister_net_hook+0x21a/0x260 [ 127.322537] ? report_bug+0x1b1/0x1e0 [ 127.322545] ? handle_bug+0x3c/0x70 [ 127.322552] ? exc_invalid_op+0x17/0x40 [ 127.322556] ? asm_exc_invalid_op+0x1a/0x20 [ 127.322563] ? kasan_save_free_info+0x3b/0x60 [ 127.322570] ? __nf_unregister_net_hook+0x6a/0x260 [ 127.322577] ? __nf_unregister_net_hook+0x21a/0x260 [ 127.322583] ? __nf_unregister_net_hook+0x6a/0x260 [ 127.322590] ? __nf_tables_unregister_hook+0x8a/0xe0 [nf_tables] [ 127.322655] nft_table_disable+0x75/0xf0 [nf_tables] [ 127.322717] nf_tables_commit+0x2571/0x2620 [nf_tables]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

17 Dec 2025, 03:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/41bad13c0e8a5a2b47a7472cced922555372daab - () https://git.kernel.org/stable/c/41bad13c0e8a5a2b47a7472cced922555372daab - Patch
References () https://git.kernel.org/stable/c/420132bee3d0136b7fba253a597b098fe15493a7 - () https://git.kernel.org/stable/c/420132bee3d0136b7fba253a597b098fe15493a7 - Patch
References () https://git.kernel.org/stable/c/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8 - () https://git.kernel.org/stable/c/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8 - Patch
References () https://git.kernel.org/stable/c/745cf6a843896cdac8766c74379300ed73c78830 - () https://git.kernel.org/stable/c/745cf6a843896cdac8766c74379300ed73c78830 - Patch
References () https://git.kernel.org/stable/c/7b6fba6918714afee3e17796113ccab636255c7b - () https://git.kernel.org/stable/c/7b6fba6918714afee3e17796113ccab636255c7b - Patch
References () https://git.kernel.org/stable/c/8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb - () https://git.kernel.org/stable/c/8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb - Patch
References () https://git.kernel.org/stable/c/994209ddf4f430946f6247616b2e33d179243769 - () https://git.kernel.org/stable/c/994209ddf4f430946f6247616b2e33d179243769 - Patch
References () https://git.kernel.org/stable/c/e95bb4cba94c018be24b11f017d1c55dd6cda31a - () https://git.kernel.org/stable/c/e95bb4cba94c018be24b11f017d1c55dd6cda31a - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory, Mailing List
CWE NVD-CWE-noinfo
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

21 Nov 2024, 09:21

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/41bad13c0e8a5a2b47a7472cced922555372daab - () https://git.kernel.org/stable/c/41bad13c0e8a5a2b47a7472cced922555372daab -
References () https://git.kernel.org/stable/c/420132bee3d0136b7fba253a597b098fe15493a7 - () https://git.kernel.org/stable/c/420132bee3d0136b7fba253a597b098fe15493a7 -
References () https://git.kernel.org/stable/c/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8 - () https://git.kernel.org/stable/c/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8 -
References () https://git.kernel.org/stable/c/745cf6a843896cdac8766c74379300ed73c78830 - () https://git.kernel.org/stable/c/745cf6a843896cdac8766c74379300ed73c78830 -
References () https://git.kernel.org/stable/c/7b6fba6918714afee3e17796113ccab636255c7b - () https://git.kernel.org/stable/c/7b6fba6918714afee3e17796113ccab636255c7b -
References () https://git.kernel.org/stable/c/8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb - () https://git.kernel.org/stable/c/8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb -
References () https://git.kernel.org/stable/c/994209ddf4f430946f6247616b2e33d179243769 - () https://git.kernel.org/stable/c/994209ddf4f430946f6247616b2e33d179243769 -
References () https://git.kernel.org/stable/c/e95bb4cba94c018be24b11f017d1c55dd6cda31a - () https://git.kernel.org/stable/c/e95bb4cba94c018be24b11f017d1c55dd6cda31a -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

16 Jun 2024, 13:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: netfilter: nf_tables: rechazar nueva cadena base después de actualizar la bandera de la tabla Cuando se activa la bandera inactiva, los enlaces se desactivan en la fase de confirmación al iterar sobre las cadenas actuales en la tabla (existentes y nuevas). La siguiente configuración permite un estado inconsistente: agregar tabla x agregar cadena xy { tipo filtro gancho entrada prioridad 0; } agregar tabla x {banderas inactivas; } agregar cadena xw {tipo filtro gancho entrada prioridad 1; } que activa la siguiente advertencia al intentar cancelar el registro de la cadena w que ya está cancelada. [127.322252] ADVERTENCIA: CPU: 7 PID: 1211 en net/netfilter/core.c:50 1 __nf_unregister_net_hook+0x21a/0x260 [...] [ 127.322519] Seguimiento de llamadas: [ 127.322521] [ 127.322524] ? __advertir+0x9f/0x1a0 [ 127.322531] ? __nf_unregister_net_hook+0x21a/0x260 [127.322537]? report_bug+0x1b1/0x1e0 [127.322545]? handle_bug+0x3c/0x70 [127.322552]? exc_invalid_op+0x17/0x40 [127.322556]? asm_exc_invalid_op+0x1a/0x20 [127.322563]? kasan_save_free_info+0x3b/0x60 [127.322570]? __nf_unregister_net_hook+0x6a/0x260 [127.322577]? __nf_unregister_net_hook+0x21a/0x260 [127.322583]? __nf_unregister_net_hook+0x6a/0x260 [127.322590]? __nf_tables_unregister_hook+0x8a/0xe0 [nf_tables] [ 127.322655] nft_table_disable+0x75/0xf0 [nf_tables] [ 127.322717] nf_tables_commit+0x2571/0x2620 [nf_tables]
References
  • () https://git.kernel.org/stable/c/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8 -

19 May 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-19 09:15

Updated : 2025-12-17 03:42


NVD link : CVE-2024-35900

Mitre link : CVE-2024-35900

CVE.ORG link : CVE-2024-35900


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel