CVE-2024-26835

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: set dormant flag on hook register failure We need to set the dormant flag again if we fail to register the hooks. During memory pressure hook registration can fail and we end up with a table marked as active but no registered hooks. On table/base chain deletion, nf_tables will attempt to unregister the hook again which yields a warn splat from the nftables core.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

02 Apr 2025, 13:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376 - () https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376 - Patch
References () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 - () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 - Patch
References () https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec - () https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec - Patch
References () https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069 - () https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069 - Patch
References () https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af - () https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af - Patch
References () https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be - () https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be - Patch
References () https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95 - () https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95 - Patch
References () https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3 - () https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3 - Patch
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
First Time Debian debian Linux
Debian
Linux linux Kernel
Linux

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'name': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'tags': [], 'refsource': ''}

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

16 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 -

17 Apr 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 10:15

Updated : 2025-04-02 13:18


NVD link : CVE-2024-26835

Mitre link : CVE-2024-26835


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux