CVE-2024-26634

In the Linux kernel, the following vulnerability has been resolved: net: fix removing a namespace with conflicting altnames Mark reports a BUG() when a net namespace is removed. kernel BUG at net/core/dev.c:11520! Physical interfaces moved outside of init_net get "refunded" to init_net when that namespace disappears. The main interface name may get overwritten in the process if it would have conflicted. We need to also discard all conflicting altnames. Recent fixes addressed ensuring that altnames get moved with the main interface, which surfaced this problem.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*

History

10 Mar 2025, 15:41

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9 - () https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9 - Mailing List, Patch
References () https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b - () https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b - Mailing List, Patch
References () https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836 - () https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836 - Mailing List, Patch
References () https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6 - () https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6 - Mailing List, Patch
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9 - () https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9 -
References () https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b - () https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b -
References () https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836 - () https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836 -
References () https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6 - () https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: net: corrige la eliminación de un espacio de nombres con nombres alternativos en conflicto. Mark informa un ERROR() cuando se elimina un espacio de nombres de red. ¡ERROR del kernel en net/core/dev.c:11520! Las interfaces físicas movidas fuera de init_net se "reembolsan" a init_net cuando ese espacio de nombres desaparece. El nombre de la interfaz principal puede sobrescribirse en el proceso si hubiera entrado en conflicto. También debemos descartar todos los nombres alternativos en conflicto. Las correcciones recientes abordaron garantizar que los nombres alternativos se movieran con la interfaz principal, lo que provocó este problema.

18 Mar 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-18 11:15

Updated : 2025-03-10 15:41


NVD link : CVE-2024-26634

Mitre link : CVE-2024-26634

CVE.ORG link : CVE-2024-26634


JSON object : View

Products Affected

linux

  • linux_kernel