Vulnerability Details : CVE-2024-26673
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.
- Disallow layer 4 protocol with no ports, since destination port is a
mandatory attribute for this object.
Products affected by CVE-2024-26673
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-26673
0.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-26673
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
1.8
|
5.2
|
NIST | 2025-03-17 |
References for CVE-2024-26673
-
https://git.kernel.org/stable/c/65ee90efc928410c6f73b3d2e0afdd762652c09d
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/38cc1605338d99205a263707f4dde76408d3e0e8
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/8059918a1377f2f1fff06af4f5a4ed3d5acd6bc4
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/0f501dae16b7099e69ee9b0d5c70b8f40fd30e98
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/f549f340c91f08b938d60266e792ff7748dae483
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
[SECURITY] [DLA 3842-1] linux-5.10 security updateMailing List
-
https://git.kernel.org/stable/c/cfe3550ea5df292c9e2d608e8c4560032391847e
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/b775ced05489f4b77a35fe203e9aeb22f428e38f
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to