- Description
- In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path The commit mutex should not be released during the critical section between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC worker could collect expired objects and get the released commit lock within the same GC sequence. nf_tables_module_autoload() temporarily releases the mutex to load module dependencies, then it goes back to replay the transaction again. Move it at the end of the abort phase after nft_gc_seq_end() is called.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Analyzed
- Products
- linux_kernel, debian_linux
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
- nvd@nist.gov
- CWE-667
- Hype score
- Not currently trending
Critical Linux kernel vuln (CVE-2024-26925) patched by #SUSE. Use-after-free in Netfilter threatens DoS & privilege escalation on Real-Time systems Read more: ๐ https://t.co/LVHQpLrPOU #Security https://t.co/u7aF943vMM
@Cezar_H_Linux
31 Oct 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#SUSE Kernel Live Patch Alert: SUSE-2025-20828-1 patches a critical Use-After-Free flaw (CVE-2024-26925). Local privilege escalation to root is possible. Patch NOW with zero downtime. ๐ Read more: ๐ https://t.co/FGVsOHL61y #Security https://t.co/FiT6kVcGY2
@Cezar_H_Linux
14 Oct 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ URGENT for #SUSE Linux users! ๐จ A high-severity kernel vulnerability (CVE-2024-26925) in Btrfs can cause system crashes. Patched in update 2025-03539-1. Read more: ๐ https://t.co/FfPV4D8Kcw #Security https://t.co/92hPmdsESl
@Cezar_H_Linux
10 Oct 2025
78 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
URGENT: High-severity flaw (CVE-2024-26925) in Linux kernel NFS client. CVSS 7.1. Requires immediate patching on #Ubuntu systems. Read more: ๐ https://t.co/p245IcRHpf #Security https://t.co/LURq6yg4t9
@Cezar_H_Linux
29 Aug 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Technical Deep Dive: netfilter nf_tables vulnerability (CVE-2024-26925) remediation. Includes: Memory corruption analysis. Ansible playbook snippet. Ad revenue protection strategies. Kernel debug log monitoring. Read more: ๐ https://t.co/qJfkgBOeAW #Ubuntu #Security http
@Cezar_H_Linux
16 Aug 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76EC9BF9-9775-4D90-B594-4C2AB71E1F86",
"versionEndExcluding": "4.20",
"versionStartIncluding": "4.19.316",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6935F9BF-B6AA-4B2F-8E03-E5276F7BD328",
"versionEndExcluding": "5.4.274",
"versionStartIncluding": "5.4.262",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4CD137-19AD-405B-AE5C-72D98EFCF3E4",
"versionEndExcluding": "5.10.215",
"versionStartIncluding": "5.10.198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3BCDE27-B701-42DC-962D-3E109FA57B3D",
"versionEndExcluding": "5.15.155",
"versionStartIncluding": "5.15.134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBD37185-B52B-4CAD-8FE8-9E60B2B5B453",
"versionEndExcluding": "6.1.86",
"versionStartIncluding": "6.1.56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B17E134C-96DA-49BA-A4B8-933F5D9C25A2",
"versionEndExcluding": "6.5",
"versionStartIncluding": "6.4.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA80EBD7-C813-4804-9178-BBE75C3D142B",
"versionEndExcluding": "6.6.26",
"versionStartIncluding": "6.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD6C99E-4250-4DFE-8447-FF2075939D10",
"versionEndExcluding": "6.8.5",
"versionStartIncluding": "6.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.5:-:*:*:*:*:*:*",
"matchCriteriaId": "A2D9420A-9BF4-4C16-B6DA-8A1D279F7384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]