CVE-2024-27397

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
14/05/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_tables: use timestamp to check for set element timeout<br /> <br /> Add a timestamp field at the beginning of the transaction, store it<br /> in the nftables per-netns area.<br /> <br /> Update set backend .insert, .deactivate and sync gc path to use the<br /> timestamp, this avoids that an element expires while control plane<br /> transaction is still unfinished.<br /> <br /> .lookup and .update, which are used from packet path, still use the<br /> current time to check if the element has expired. And .get path and dump<br /> also since this runs lockless under rcu read size lock. Then, there is<br /> async gc which also needs to check the current time since it runs<br /> asynchronously from a workqueue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.1 (including) 4.19.320 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.282 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.224 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.165 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.97 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.84 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.5 (excluding)
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*