Skip to main content

CVE-2024-35897: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-35897cvecve-2024-35897
Published: Sun May 19 2024 (05/19/2024, 08:34:51 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: discard table flag update with pending basechain deletion Hook unregistration is deferred to the commit phase, same occurs with hook updates triggered by the table dormant flag. When both commands are combined, this results in deleting a basechain while leaving its hook still registered in the core.

AI-Powered Analysis

AILast updated: 06/29/2025, 07:55:30 UTC

Technical Analysis

CVE-2024-35897 is a vulnerability in the Linux kernel's netfilter subsystem, specifically within the nf_tables component responsible for packet filtering and firewall functionality. The issue arises from the way the kernel handles updates to the discard table flag when there is a pending deletion of a basechain. In netfilter, hooks are used to intercept network packets at various points in the kernel's networking stack. The vulnerability occurs because hook unregistration is deferred until the commit phase, and similarly, hook updates triggered by setting the table dormant flag are also deferred. When these two operations—deleting a basechain and updating the discard flag—are combined, the basechain can be deleted while its associated hook remains registered in the kernel core. This results in a state where the kernel references a non-existent or invalid basechain via the still-registered hook, potentially leading to undefined behavior such as use-after-free conditions or memory corruption. Such conditions could be exploited to cause denial of service (kernel panic or crash) or potentially escalate privileges if an attacker can manipulate the state to execute arbitrary code within kernel context. The vulnerability affects multiple recent Linux kernel versions as indicated by the commit hashes listed, and it was publicly disclosed on May 19, 2024. There are no known exploits in the wild at the time of disclosure, and no CVSS score has been assigned yet. However, the technical nature of the flaw and its location in a critical kernel networking component make it a significant security concern, especially for systems relying on nf_tables for firewalling and packet filtering.

Potential Impact

For European organizations, the impact of CVE-2024-35897 can be substantial, particularly for those operating Linux-based servers, network appliances, or cloud infrastructure that utilize the nf_tables framework for firewall and packet filtering. Exploitation could lead to system instability or crashes, resulting in denial of service conditions that disrupt business operations, critical services, or network security enforcement. In worst-case scenarios, if an attacker leverages this vulnerability for privilege escalation, it could lead to unauthorized access to sensitive data or control over critical systems. This is especially concerning for sectors with high reliance on Linux infrastructure such as telecommunications, finance, government, and cloud service providers. The vulnerability's presence in the kernel networking stack also means that network-facing systems are at risk, increasing the attack surface. Given the lack of known exploits currently, the immediate risk may be moderate, but the potential for future exploitation necessitates prompt attention. Additionally, European organizations must consider compliance with data protection regulations like GDPR, where a security incident caused by this vulnerability could lead to regulatory scrutiny and penalties.

Mitigation Recommendations

To mitigate CVE-2024-35897, European organizations should prioritize the following actions: 1) Apply the official Linux kernel patches that address this vulnerability as soon as they become available from trusted sources such as the Linux kernel mailing list or their Linux distribution vendors. 2) For environments where immediate patching is not feasible, consider temporarily disabling or restricting the use of nf_tables-based firewall rules or the discard table flag functionality if possible, to reduce exposure. 3) Implement rigorous monitoring of kernel logs and network subsystem behavior to detect anomalies that might indicate exploitation attempts or instability related to this vulnerability. 4) Employ network segmentation and strict access controls to limit the ability of untrusted users or processes to interact with the affected kernel components. 5) Maintain up-to-date backups and incident response plans to quickly recover from potential denial of service or compromise scenarios. 6) Coordinate with Linux distribution vendors and security advisories to track updates and guidance. These steps go beyond generic advice by focusing on the specific subsystem affected and operational controls relevant to nf_tables usage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.114Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe20ed

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 7:55:30 AM

Last updated: 8/17/2025, 11:28:11 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats