CVE-2024-26929
Published May 1, 2024
Last updated a year ago
- Description
- Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Rejected
- Products
- linux_kernel
- Hype score
- Not currently trending
⚠️ URGENT for Linux sysadmins: CVE-2024-26929 patched in #Ubuntu USN-7907-1. High-severity use-after-free in nf_tables. Read more: 👉 https://t.co/CkolNIJ4Z2 #Security https://t.co/Q2rrVFQho9
@Cezar_H_Linux
3 Dec 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 URGENT for #Ubuntu Admins 🚨 USN-7860-1 patches CRITICAL kernel vulnerabilities (CVE-2024-26929, CVE-2024-26930) in netfilter. Read more: 👉 https://t.co/WnlpdcthYp #Security https://t.co/GD8mwjduEQ
@Cezar_H_Linux
6 Nov 2025
60 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 #OpenSUSE Security Alert: CVE-2024-26929 A local privilege escalation vuln in the Linux kernel (BTRFS) has been patched. High severity - can lead to root access. Read more: 👉 https://t.co/UTcVyzODj4 https://t.co/Bz7JwLqMXU
@Cezar_H_Linux
23 Oct 2025
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Linux kernel vuln CVE-2024-26929 patched in #Ubuntu. ⚠️ Read more: 👉 https://t.co/yb0XS4xdLD #Security https://t.co/lgFp1Q5wZI
@Cezar_H_Linux
7 Oct 2025
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Urgent: #Ubuntu Security Advisory USN-7791-3 patches a critical Linux kernel vulnerability (CVE-2024-26929). Impact: Local Privilege Escalation to root. Read more: 👉 https://t.co/eWuJwKcWyr #Security https://t.co/4O4VuL6wL4
@Cezar_H_Linux
6 Oct 2025
71 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Linux kernel vuln (CVE-2024-26929) patched in #Ubuntu. Race condition in netfilter → Local Privilege Escalation to root. 🚨 Affects Ubuntu 20.04, 22.04 LTS, & 23.10. Read more: 👉 https://t.co/5n4yTZF6Cl #Security https://t.co/qLNRmXerFH
@Cezar_H_Linux
2 Oct 2025
70 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "131A208A-4C74-498A-BFFB-240B45FE2C0C",
"versionEndExcluding": "5.15.154",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "834D9BD5-42A6-4D74-979E-4D6D93F630FD",
"versionEndExcluding": "6.1.84",
"versionStartIncluding": "5.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693",
"versionEndExcluding": "6.6.24",
"versionStartIncluding": "6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53",
"versionEndExcluding": "6.7.12",
"versionStartIncluding": "6.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1649B701-9DF9-4E5D-AA4B-6A7071BF05D6",
"versionEndExcluding": "6.8.3",
"versionStartExcluding": "6.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]