In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_limit: reject configurations that cause integer overflow
Reject bogus configs where internal token counter wraps around.
This only occurs with very very large requests, such as 17gbyte/s.
Its better to reject this rather than having incorrect ratelimit.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 28 Aug 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat enterprise Linux
|
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat enterprise Linux
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-04-02T06:43:29.690Z
Updated: 2024-09-11T17:33:38.702Z
Reserved: 2024-02-19T14:20:24.149Z
Link: CVE-2024-26668
Vulnrichment
Updated: 2024-08-02T00:14:12.622Z
NVD
Status : Awaiting Analysis
Published: 2024-04-02T07:15:43.627
Modified: 2024-04-02T12:50:42.233
Link: CVE-2024-26668
Redhat