CVE-2024-26835

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: set dormant flag on hook register failure We need to set the dormant flag again if we fail to register the hooks. During memory pressure hook registration can fail and we end up with a table marked as active but no registered hooks. On table/base chain deletion, nf_tables will attempt to unregister the hook again which yields a warn splat from the nftables core.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

02 Apr 2025, 13:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Debian debian Linux
Debian
Linux
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376 - () https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376 - Patch
References () https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af - () https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af - Patch
References () https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be - () https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be - Patch
References () https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95 - () https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95 - Patch
References () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 - () https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 - Patch
References () https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3 - () https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3 - Patch
References () https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec - () https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec - Patch
References () https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069 - () https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List

Information

Published : 2024-04-17 10:15

Updated : 2025-04-02 13:18


NVD link : CVE-2024-26835

Mitre link : CVE-2024-26835

CVE.ORG link : CVE-2024-26835


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux