CVE-2024-26581

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:02

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8 - Patch () https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8 - Patch
References () https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb - Patch () https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb - Patch
References () https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003 - Patch () https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003 - Patch
References () https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a - Patch () https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a - Patch
References () https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0 - Patch () https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0 - Patch
References () https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9 - Patch () https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9 - Patch
References () https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7 - Patch () https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7 - Patch
References () https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb - () https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

30 Oct 2024, 20:35

Type Values Removed Values Added
CWE CWE-416

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

16 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb -

19 Apr 2024, 17:41

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8 - () https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8 - Patch
References () https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb - () https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb - Patch
References () https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003 - () https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003 - Patch
References () https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a - () https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a - Patch
References () https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0 - () https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0 - Patch
References () https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9 - () https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9 - Patch
References () https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7 - () https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7 - Patch

23 Feb 2024, 09:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a -
  • () https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8 -
  • () https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003 -

20 Feb 2024, 18:15

Type Values Removed Values Added
Summary netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active. In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.
References
  • {'url': 'https://git.kernel.org/stable/c/6eb14441f106', 'name': 'https://git.kernel.org/stable/c/6eb14441f106', 'tags': [], 'refsource': ''}
  • {'url': 'https://git.kernel.org/stable/c/b734f7a47aeb', 'name': 'https://git.kernel.org/stable/c/b734f7a47aeb', 'tags': [], 'refsource': ''}
  • {'url': 'https://git.kernel.org/stable/c/1296c110c5a0', 'name': 'https://git.kernel.org/stable/c/1296c110c5a0', 'tags': [], 'refsource': ''}
  • {'url': 'https://git.kernel.org/stable/c/60c0c230c6f0', 'name': 'https://git.kernel.org/stable/c/60c0c230c6f0', 'tags': [], 'refsource': ''}
  • () https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9 -
  • () https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb -
  • () https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7 -
  • () https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0 -

20 Feb 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-20 13:15

Updated : 2024-11-21 09:02


NVD link : CVE-2024-26581

Mitre link : CVE-2024-26581

CVE.ORG link : CVE-2024-26581


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
NVD-CWE-noinfo CWE-416

Use After Free