Skip to main content

CVE-2024-35900: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-35900cvecve-2024-35900
Published: Sun May 19 2024 (05/19/2024, 08:34:54 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject new basechain after table flag update When dormant flag is toggled, hooks are disabled in the commit phase by iterating over current chains in table (existing and new). The following configuration allows for an inconsistent state: add table x add chain x y { type filter hook input priority 0; } add table x { flags dormant; } add chain x w { type filter hook input priority 1; } which triggers the following warning when trying to unregister chain w which is already unregistered. [ 127.322252] WARNING: CPU: 7 PID: 1211 at net/netfilter/core.c:50 1 __nf_unregister_net_hook+0x21a/0x260 [...] [ 127.322519] Call Trace: [ 127.322521] <TASK> [ 127.322524] ? __warn+0x9f/0x1a0 [ 127.322531] ? __nf_unregister_net_hook+0x21a/0x260 [ 127.322537] ? report_bug+0x1b1/0x1e0 [ 127.322545] ? handle_bug+0x3c/0x70 [ 127.322552] ? exc_invalid_op+0x17/0x40 [ 127.322556] ? asm_exc_invalid_op+0x1a/0x20 [ 127.322563] ? kasan_save_free_info+0x3b/0x60 [ 127.322570] ? __nf_unregister_net_hook+0x6a/0x260 [ 127.322577] ? __nf_unregister_net_hook+0x21a/0x260 [ 127.322583] ? __nf_unregister_net_hook+0x6a/0x260 [ 127.322590] ? __nf_tables_unregister_hook+0x8a/0xe0 [nf_tables] [ 127.322655] nft_table_disable+0x75/0xf0 [nf_tables] [ 127.322717] nf_tables_commit+0x2571/0x2620 [nf_tables]

AI-Powered Analysis

AILast updated: 06/29/2025, 07:56:48 UTC

Technical Analysis

CVE-2024-35900 is a vulnerability identified in the Linux kernel's netfilter subsystem, specifically within the nf_tables component responsible for packet filtering and firewall functionality. The issue arises when the 'dormant' flag is toggled on a table, which disables hooks during the commit phase by iterating over current chains in the table, including both existing and newly added chains. The vulnerability manifests when a specific sequence of commands is executed: adding a table, adding a chain with a filter hook, setting the table's dormant flag, and then adding another chain with a filter hook at a different priority. This sequence leads to an inconsistent internal state where a chain (e.g., chain 'w') is considered already unregistered but is attempted to be unregistered again, triggering kernel warnings and potentially causing instability. The kernel warning logs indicate repeated calls to __nf_unregister_net_hook and related functions, suggesting improper handling of netfilter hooks during state transitions. While the vulnerability does not currently have known exploits in the wild, the inconsistent state could lead to denial of service (DoS) conditions by crashing or destabilizing the kernel or potentially enable privilege escalation if exploited in conjunction with other vulnerabilities. The vulnerability affects multiple recent Linux kernel versions as indicated by the affected commit hashes, and it has been publicly disclosed as of May 19, 2024. No CVSS score has been assigned yet, but the issue is recognized and patched by the Linux kernel maintainers.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected nf_tables implementation, which is widely used in servers, network appliances, and cloud infrastructure. The netfilter subsystem is critical for firewalling and network traffic filtering; thus, exploitation or triggering of this vulnerability could lead to kernel instability or crashes, resulting in denial of service. This could disrupt critical services, especially in sectors relying heavily on Linux-based infrastructure such as finance, telecommunications, government, and cloud service providers. While there is no evidence of active exploitation, the potential for kernel panic or system crashes could be leveraged by attackers to cause outages or as part of a multi-stage attack to gain elevated privileges. Given the widespread use of Linux in European data centers and enterprise environments, the impact could be significant if unpatched systems are targeted. Additionally, the vulnerability could affect embedded Linux devices used in industrial control systems or network equipment, potentially impacting operational technology environments.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel versions to the latest patched releases that address CVE-2024-35900. Since the vulnerability involves the nf_tables subsystem, administrators should audit firewall and netfilter configurations to avoid complex or unusual table and chain manipulations that toggle the dormant flag unnecessarily. Network administrators should implement strict change management and monitoring around netfilter configurations to detect anomalous or unauthorized modifications that could trigger the inconsistent state. For environments where immediate kernel upgrades are not feasible, consider isolating vulnerable systems from untrusted networks to reduce exposure. Additionally, enabling kernel crash dumps and monitoring kernel logs for warnings related to __nf_unregister_net_hook can help detect attempts to trigger the vulnerability. Security teams should also review and harden access controls to limit who can modify netfilter configurations, as exploitation requires the ability to manipulate firewall rules. Finally, maintain close coordination with Linux kernel security advisories and apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.114Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe2117

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 7:56:48 AM

Last updated: 8/11/2025, 1:19:50 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats