{"id":"CVE-2024-26835","summary":"netfilter: nf_tables: set dormant flag on hook register failure","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: set dormant flag on hook register failure\n\nWe need to set the dormant flag again if we fail to register\nthe hooks.\n\nDuring memory pressure hook registration can fail and we end up\nwith a table marked as active but no registered hooks.\n\nOn table/base chain deletion, nf_tables will attempt to unregister\nthe hook again which yields a warn splat from the nftables core.","modified":"2026-04-02T10:06:09.200149Z","published":"2024-04-17T10:10:02.907Z","related":["SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3483-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26835.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376"},{"type":"WEB","url":"https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af"},{"type":"WEB","url":"https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26835.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26835"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"bf8083bbf8fa202e6e5316bbd99759ab82bfe7a3"},{"fixed":"a6411f3c48f991c19aaf9a24fce36865fbba28d7"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e10f661adc556c4969c70ddaddf238bffdaf1e87"},{"fixed":"ae4360cbd385f0d7a8a86d5723e50448cc6318f3"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d9c4da8cb74e8ee6e58a064a3573aa37acf6c935"},{"fixed":"31ea574aeca1aa488e18716459bde057217637af"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"179d9ba5559a756f4322583388b3213fe4e391b0"},{"fixed":"664264a5c55bf97a9c571c557d477b75416199be"},{"fixed":"0c9302a6da262e6ab6a6c1d30f04a6130ed97376"},{"fixed":"f2135bbf14949687e96cabb13d8a91ae3deb9069"},{"fixed":"6f2496366426cec18ba53f1c7f6c3ac307ca6a95"},{"fixed":"bccebf64701735533c8db37773eeacc6566cc8ec"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26835.json"}}],"schema_version":"1.7.5"}