{"id":"CVE-2024-26581","summary":"netfilter: nft_set_rbtree: skip end interval element from gc","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_rbtree: skip end interval element from gc\n\nrbtree lazy gc on insert might collect an end interval element that has\nbeen just added in this transactions, skip end interval elements that\nare not yet active.","modified":"2026-04-02T10:04:50.333716Z","published":"2024-02-20T12:52:57.398Z","related":["ALSA-2024:5928","SUSE-SU-2024:2010-1","SUSE-SU-2024:2183-1","SUSE-SU-2024:2185-1","SUSE-SU-2026:0474-1","SUSE-SU-2026:0496-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:1131-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26581.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26581.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26581"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8284a79136c384059e85e278da2210b809730287"},{"fixed":"c60d252949caf9aba537525195edae6bbabc35eb"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"acaee227cf79c45a5d2d49c3e9a66333a462802c"},{"fixed":"10e9cb39313627f2eae4cd70c4b742074e998fd8"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"893cb3c3513cf661a0ff45fe0cfa83fe27131f76"},{"fixed":"4cee42fcf54fec46b344681e7cc4f234bb22f85a"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"50cbb9d195c197af671869c8cadce3bd483735a0"},{"fixed":"2bab493a5624444ec6e648ad0d55a362bcb4c003"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"89a4d1a89751a0fbd520e64091873e19cc0979e8"},{"fixed":"1296c110c5a0b45a8fcf58e7d18bc5da61a565cb"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f718863aca469a109895cb855e6b81fff4827d71"},{"fixed":"b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7"},{"fixed":"6eb14441f10602fa1cf691da9d685718b68b78a9"},{"fixed":"60c0c230c6f046da536d3df8b39a20b9a9fd6af0"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"cd66733932399475fe933cb3ec03e687ed401462"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26581.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}