CVE-2024-35900: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject new basechain after table flag update When dormant flag is toggled, hooks are disabled in the commit phase by iterating over current chains in table (existing and new). The following configuration allows for an inconsistent state: add table x add chain x y { type filter hook input priority 0; } add table x { flags dormant; } add chain x w { type filter hook input priority 1; } which triggers the following warning when trying to unregister chain w which is already unregistered. [ 127.322252] WARNING: CPU: 7 PID: 1211 at net/netfilter/core.c:50 1 __nf_unregister_net_hook+0x21a/0x260 [...] [ 127.322519] Call Trace: [ 127.322521] <TASK> [ 127.322524] ? __warn+0x9f/0x1a0 [ 127.322531] ? __nf_unregister_net_hook+0x21a/0x260 [ 127.322537] ? report_bug+0x1b1/0x1e0 [ 127.322545] ? handle_bug+0x3c/0x70 [ 127.322552] ? exc_invalid_op+0x17/0x40 [ 127.322556] ? asm_exc_invalid_op+0x1a/0x20 [ 127.322563] ? kasan_save_free_info+0x3b/0x60 [ 127.322570] ? __nf_unregister_net_hook+0x6a/0x260 [ 127.322577] ? __nf_unregister_net_hook+0x21a/0x260 [ 127.322583] ? __nf_unregister_net_hook+0x6a/0x260 [ 127.322590] ? __nf_tables_unregister_hook+0x8a/0xe0 [nf_tables] [ 127.322655] nft_table_disable+0x75/0xf0 [nf_tables] [ 127.322717] nf_tables_commit+0x2571/0x2620 [nf_tables]
AI Analysis
Technical Summary
CVE-2024-35900 is a vulnerability identified in the Linux kernel's netfilter subsystem, specifically within the nf_tables component responsible for packet filtering and firewall functionality. The issue arises when the 'dormant' flag is toggled on a table, which disables hooks during the commit phase by iterating over current chains in the table, including both existing and newly added chains. The vulnerability manifests when a specific sequence of commands is executed: adding a table, adding a chain with a filter hook, setting the table's dormant flag, and then adding another chain with a filter hook at a different priority. This sequence leads to an inconsistent internal state where a chain (e.g., chain 'w') is considered already unregistered but is attempted to be unregistered again, triggering kernel warnings and potentially causing instability. The kernel warning logs indicate repeated calls to __nf_unregister_net_hook and related functions, suggesting improper handling of netfilter hooks during state transitions. While the vulnerability does not currently have known exploits in the wild, the inconsistent state could lead to denial of service (DoS) conditions by crashing or destabilizing the kernel or potentially enable privilege escalation if exploited in conjunction with other vulnerabilities. The vulnerability affects multiple recent Linux kernel versions as indicated by the affected commit hashes, and it has been publicly disclosed as of May 19, 2024. No CVSS score has been assigned yet, but the issue is recognized and patched by the Linux kernel maintainers.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected nf_tables implementation, which is widely used in servers, network appliances, and cloud infrastructure. The netfilter subsystem is critical for firewalling and network traffic filtering; thus, exploitation or triggering of this vulnerability could lead to kernel instability or crashes, resulting in denial of service. This could disrupt critical services, especially in sectors relying heavily on Linux-based infrastructure such as finance, telecommunications, government, and cloud service providers. While there is no evidence of active exploitation, the potential for kernel panic or system crashes could be leveraged by attackers to cause outages or as part of a multi-stage attack to gain elevated privileges. Given the widespread use of Linux in European data centers and enterprise environments, the impact could be significant if unpatched systems are targeted. Additionally, the vulnerability could affect embedded Linux devices used in industrial control systems or network equipment, potentially impacting operational technology environments.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to the latest patched releases that address CVE-2024-35900. Since the vulnerability involves the nf_tables subsystem, administrators should audit firewall and netfilter configurations to avoid complex or unusual table and chain manipulations that toggle the dormant flag unnecessarily. Network administrators should implement strict change management and monitoring around netfilter configurations to detect anomalous or unauthorized modifications that could trigger the inconsistent state. For environments where immediate kernel upgrades are not feasible, consider isolating vulnerable systems from untrusted networks to reduce exposure. Additionally, enabling kernel crash dumps and monitoring kernel logs for warnings related to __nf_unregister_net_hook can help detect attempts to trigger the vulnerability. Security teams should also review and harden access controls to limit who can modify netfilter configurations, as exploitation requires the ability to manipulate firewall rules. Finally, maintain close coordination with Linux kernel security advisories and apply patches promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Finland
CVE-2024-35900: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject new basechain after table flag update When dormant flag is toggled, hooks are disabled in the commit phase by iterating over current chains in table (existing and new). The following configuration allows for an inconsistent state: add table x add chain x y { type filter hook input priority 0; } add table x { flags dormant; } add chain x w { type filter hook input priority 1; } which triggers the following warning when trying to unregister chain w which is already unregistered. [ 127.322252] WARNING: CPU: 7 PID: 1211 at net/netfilter/core.c:50 1 __nf_unregister_net_hook+0x21a/0x260 [...] [ 127.322519] Call Trace: [ 127.322521] <TASK> [ 127.322524] ? __warn+0x9f/0x1a0 [ 127.322531] ? __nf_unregister_net_hook+0x21a/0x260 [ 127.322537] ? report_bug+0x1b1/0x1e0 [ 127.322545] ? handle_bug+0x3c/0x70 [ 127.322552] ? exc_invalid_op+0x17/0x40 [ 127.322556] ? asm_exc_invalid_op+0x1a/0x20 [ 127.322563] ? kasan_save_free_info+0x3b/0x60 [ 127.322570] ? __nf_unregister_net_hook+0x6a/0x260 [ 127.322577] ? __nf_unregister_net_hook+0x21a/0x260 [ 127.322583] ? __nf_unregister_net_hook+0x6a/0x260 [ 127.322590] ? __nf_tables_unregister_hook+0x8a/0xe0 [nf_tables] [ 127.322655] nft_table_disable+0x75/0xf0 [nf_tables] [ 127.322717] nf_tables_commit+0x2571/0x2620 [nf_tables]
AI-Powered Analysis
Technical Analysis
CVE-2024-35900 is a vulnerability identified in the Linux kernel's netfilter subsystem, specifically within the nf_tables component responsible for packet filtering and firewall functionality. The issue arises when the 'dormant' flag is toggled on a table, which disables hooks during the commit phase by iterating over current chains in the table, including both existing and newly added chains. The vulnerability manifests when a specific sequence of commands is executed: adding a table, adding a chain with a filter hook, setting the table's dormant flag, and then adding another chain with a filter hook at a different priority. This sequence leads to an inconsistent internal state where a chain (e.g., chain 'w') is considered already unregistered but is attempted to be unregistered again, triggering kernel warnings and potentially causing instability. The kernel warning logs indicate repeated calls to __nf_unregister_net_hook and related functions, suggesting improper handling of netfilter hooks during state transitions. While the vulnerability does not currently have known exploits in the wild, the inconsistent state could lead to denial of service (DoS) conditions by crashing or destabilizing the kernel or potentially enable privilege escalation if exploited in conjunction with other vulnerabilities. The vulnerability affects multiple recent Linux kernel versions as indicated by the affected commit hashes, and it has been publicly disclosed as of May 19, 2024. No CVSS score has been assigned yet, but the issue is recognized and patched by the Linux kernel maintainers.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected nf_tables implementation, which is widely used in servers, network appliances, and cloud infrastructure. The netfilter subsystem is critical for firewalling and network traffic filtering; thus, exploitation or triggering of this vulnerability could lead to kernel instability or crashes, resulting in denial of service. This could disrupt critical services, especially in sectors relying heavily on Linux-based infrastructure such as finance, telecommunications, government, and cloud service providers. While there is no evidence of active exploitation, the potential for kernel panic or system crashes could be leveraged by attackers to cause outages or as part of a multi-stage attack to gain elevated privileges. Given the widespread use of Linux in European data centers and enterprise environments, the impact could be significant if unpatched systems are targeted. Additionally, the vulnerability could affect embedded Linux devices used in industrial control systems or network equipment, potentially impacting operational technology environments.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to the latest patched releases that address CVE-2024-35900. Since the vulnerability involves the nf_tables subsystem, administrators should audit firewall and netfilter configurations to avoid complex or unusual table and chain manipulations that toggle the dormant flag unnecessarily. Network administrators should implement strict change management and monitoring around netfilter configurations to detect anomalous or unauthorized modifications that could trigger the inconsistent state. For environments where immediate kernel upgrades are not feasible, consider isolating vulnerable systems from untrusted networks to reduce exposure. Additionally, enabling kernel crash dumps and monitoring kernel logs for warnings related to __nf_unregister_net_hook can help detect attempts to trigger the vulnerability. Security teams should also review and harden access controls to limit who can modify netfilter configurations, as exploitation requires the ability to manipulate firewall rules. Finally, maintain close coordination with Linux kernel security advisories and apply patches promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.114Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe2117
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 7:56:48 AM
Last updated: 8/11/2025, 1:19:50 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.