CVE-2024-26809 — Use After Free in Linux
Severity
5.5MEDIUMNVD
OSV7.5OSV7.0OSV6.5
EPSS
0.0%
top 97.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 4
Latest updateJul 26
Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_pipapo: release elements in clone only from destroy path
Clone already always provides a current view of the lookup table, use it
to destroy the set, otherwise it is possible to destroy elements twice.
This fix requires:
212ed75dc5fb ("netfilter: nf_tables: integrate pipapo into commit protocol")
which came after:
9827a0e6e23b ("netfilter: nft_set_pipapo: release elements in clone from abort path").
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages5 packages
▶CVEListV5linux/linux4a6430b99f67842617c7208ca55a411e903ba03a — b36b83297ff4910dfc8705402c8abffd4bbf8144+8
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
23📋Vendor Advisories
23💬Community
1Bugzilla▶
CVE-2024-26809 kernel: netfilter: nft_set_pipapo: release elements in clone only from destroy path↗2024-04-04