Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-3840-1 | linux security update |
![]() |
DLA-3842-1 | linux-5.10 security update |
![]() |
DSA-5681-1 | linux security update |
![]() |
EUVD-2024-16400 | A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality. |
![]() |
USN-6639-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-6680-1 | Linux kernel vulnerabilities |
![]() |
USN-6680-2 | Linux kernel vulnerabilities |
![]() |
USN-6680-3 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-6686-1 | Linux kernel vulnerabilities |
![]() |
USN-6686-2 | Linux kernel vulnerabilities |
![]() |
USN-6686-3 | Linux kernel (Oracle) vulnerabilities |
![]() |
USN-6686-4 | Linux kernel (KVM) vulnerabilities |
![]() |
USN-6686-5 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-6705-1 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-6726-1 | Linux kernel vulnerabilities |
![]() |
USN-6726-2 | Linux kernel (IoT) vulnerabilities |
![]() |
USN-6726-3 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
To mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel netfilter module. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278
Mon, 02 Jun 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 27 Sep 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-09-15T11:13:57.492Z
Reserved: 2024-01-16T16:45:59.397Z
Link: CVE-2024-0607

Updated: 2024-08-01T18:11:35.646Z

Status : Modified
Published: 2024-01-18T16:15:08.690
Modified: 2024-11-21T08:46:59.383
Link: CVE-2024-0607


No data.