First published: Tue Feb 20 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.1.78 | 6.1.78 |
Linux Kernel | <5.4.269 | |
Linux Kernel | >=5.5.0<5.10.210 | |
Linux Kernel | >=5.11.0<5.15.149 | |
Linux Kernel | >=5.16.0<6.1.78 | |
Linux Kernel | >=6.2.0<6.6.17 | |
Linux Kernel | >=6.7.0<6.7.5 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26581 has been classified with a medium severity level due to its potential impact on the Linux kernel's netfilter functionality.
To fix CVE-2024-26581, upgrade the Linux kernel to version 6.1.78 or later for affected Red Hat distributions, or apply available patches for Debian-based systems.
CVE-2024-26581 affects Linux kernel versions between 5.4.269 and 6.1.78, as well as several subranges within those versions.
No specific workarounds have been documented for CVE-2024-26581, so upgrading is the recommended course of action.
CVE-2024-26581 could potentially be exploited remotely depending on the specific usage of affected systems within a network.