๐Ÿ” CVE Alert

CVE-2024-53141

UNKNOWN 0.0

netfilter: ipset: add missing range check in bitmap_ip_uadt

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values of ip and ip_to are slightly swapped. Therefore, the range check for ip should be done later, but this part is missing and it seems that the vulnerability occurs. So we should add missing range checks and remove unnecessary range checks.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 6, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
72205fc68bd13109576aa6c4c12c740962d28a6c < 3c20b5948f119ae61ee35ad8584d666020c91581 72205fc68bd13109576aa6c4c12c740962d28a6c < 78b0f2028f1043227a8eb0c41944027fc6a04596 72205fc68bd13109576aa6c4c12c740962d28a6c < 2e151b8ca31607d14fddc4ad0f14da0893e1a7c7 72205fc68bd13109576aa6c4c12c740962d28a6c < e67471437ae9083fa73fa67eee1573fec1b7c8cf 72205fc68bd13109576aa6c4c12c740962d28a6c < 7ffef5e5d5eeecd9687204a5ec2d863752aafb7e 72205fc68bd13109576aa6c4c12c740962d28a6c < 856023ef032d824309abd5c747241dffa33aae8c 72205fc68bd13109576aa6c4c12c740962d28a6c < 591efa494a1cf649f50a35def649c43ae984cd03 72205fc68bd13109576aa6c4c12c740962d28a6c < 15794835378ed56fb9bacc6a5dd3b9f33520604e 72205fc68bd13109576aa6c4c12c740962d28a6c < 35f56c554eb1b56b77b3cf197a6b00922d49033d
Linux / Linux
2.6.39

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3c20b5948f119ae61ee35ad8584d666020c91581 git.kernel.org: https://git.kernel.org/stable/c/78b0f2028f1043227a8eb0c41944027fc6a04596 git.kernel.org: https://git.kernel.org/stable/c/2e151b8ca31607d14fddc4ad0f14da0893e1a7c7 git.kernel.org: https://git.kernel.org/stable/c/e67471437ae9083fa73fa67eee1573fec1b7c8cf git.kernel.org: https://git.kernel.org/stable/c/7ffef5e5d5eeecd9687204a5ec2d863752aafb7e git.kernel.org: https://git.kernel.org/stable/c/856023ef032d824309abd5c747241dffa33aae8c git.kernel.org: https://git.kernel.org/stable/c/591efa494a1cf649f50a35def649c43ae984cd03 git.kernel.org: https://git.kernel.org/stable/c/15794835378ed56fb9bacc6a5dd3b9f33520604e git.kernel.org: https://git.kernel.org/stable/c/35f56c554eb1b56b77b3cf197a6b00922d49033d lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html