In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_limit: reject configurations that cause integer overflow
Reject bogus configs where internal token counter wraps around. This only occurs with very very large requests, such as 17gbyte/s.
Its better to reject this rather than having incorrect ratelimit.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26668.json"
}[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-26668-00351bf3",
"target": {
"file": "net/netfilter/nft_limit.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"337778537821892386377668483319419103824",
"265174023095603771637042359376872990577",
"79876904119085538062377015337411436388",
"46795955041922519979255955471672464462",
"35932048629801785632967457129776876423",
"200624778618880640588678881872766592618",
"84330321191821168906395991897444866274",
"215957637531787739590028877519569128446",
"205248177423975031141263203622420396021",
"187750453631052478531678678152591758479",
"32144379309608309305946561575716549427",
"60022535756102924622363942168257563935",
"182440281659662452326036627660643518713",
"275646002831901730267013502201200942008",
"33824301273186792834776937019566484578",
"172632845606319071247232533193587028000",
"303830549582273454774093155323038506950",
"247116780793892586746948529492856396355",
"9561694331938529564443381881635270755",
"74990874736148579140241086474848112110",
"261779120270793061157483884863952050799",
"203572973446093617774700924686039573524",
"245978888632585169176702448357053602322"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@79d4efd75e7dbecd855a3b8a63e65f7265f466e1"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26668.json"