CVE-2024-26581

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Mar 2025, 19:10

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory
References () https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb - () https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb - Patch
First Time Debian debian Linux
Debian
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'name': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'tags': [], 'refsource': ''}

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

16 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb -

19 Apr 2024, 17:41

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb - () https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb - Patch
References () https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003 - () https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003 - Patch
References () https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9 - () https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9 - Patch
References () https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0 - () https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0 - Patch
References () https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8 - () https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8 - Patch
References () https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7 - () https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7 - Patch
References () https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a - () https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel

23 Feb 2024, 09:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8 -
  • () https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003 -
  • () https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a -

20 Feb 2024, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://git.kernel.org/stable/c/1296c110c5a0', 'name': 'https://git.kernel.org/stable/c/1296c110c5a0', 'tags': [], 'refsource': ''}
  • {'url': 'https://git.kernel.org/stable/c/60c0c230c6f0', 'name': 'https://git.kernel.org/stable/c/60c0c230c6f0', 'tags': [], 'refsource': ''}
  • {'url': 'https://git.kernel.org/stable/c/b734f7a47aeb', 'name': 'https://git.kernel.org/stable/c/b734f7a47aeb', 'tags': [], 'refsource': ''}
  • {'url': 'https://git.kernel.org/stable/c/6eb14441f106', 'name': 'https://git.kernel.org/stable/c/6eb14441f106', 'tags': [], 'refsource': ''}
  • () https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7 -
  • () https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9 -
  • () https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0 -
  • () https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb -
Summary netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active. In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.

20 Feb 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-20 13:15

Updated : 2025-03-14 19:10


NVD link : CVE-2024-26581

Mitre link : CVE-2024-26581


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel