| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: use timestamp to check for set element timeout\n\nAdd a timestamp field at the beginning of the transaction, store it\nin the nftables per-netns area.\n\nUpdate set backend .insert, .deactivate and sync gc path to use the\ntimestamp, this avoids that an element expires while control plane\ntransaction is still unfinished.\n\n.lookup and .update, which are used from packet path, still use the\ncurrent time to check if the element has expired. And .get path and dump\nalso since this runs lockless under rcu read size lock. Then, there is\nasync gc which also needs to check the current time since it runs\nasynchronously from a workqueue." |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "include/net/netfilter/nf_tables.h", |
| "net/netfilter/nf_tables_api.c", |
| "net/netfilter/nft_set_hash.c", |
| "net/netfilter/nft_set_pipapo.c", |
| "net/netfilter/nft_set_rbtree.c" |
| ], |
| "versions": [ |
| { |
| "version": "c3e1b005ed1cc068fc9d454a6e745830d55d251d", |
| "lessThan": "f8dfda798650241c1692058713ca4fef8e429061", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c3e1b005ed1cc068fc9d454a6e745830d55d251d", |
| "lessThan": "eaf1a29ea5d7dba8e84e9e9f3b3f47d0cd540bfe", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c3e1b005ed1cc068fc9d454a6e745830d55d251d", |
| "lessThan": "7b17de2a71e56c10335b565cc7ad238e6d984379", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c3e1b005ed1cc068fc9d454a6e745830d55d251d", |
| "lessThan": "0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c3e1b005ed1cc068fc9d454a6e745830d55d251d", |
| "lessThan": "b45176b869673417ace338b87cf9cdb66e2eeb01", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c3e1b005ed1cc068fc9d454a6e745830d55d251d", |
| "lessThan": "7fa2e2960fff8322ce2ded57b5f8e9cbc450b967", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c3e1b005ed1cc068fc9d454a6e745830d55d251d", |
| "lessThan": "383182db8d58c4237772ba0764cded4938a235c3", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c3e1b005ed1cc068fc9d454a6e745830d55d251d", |
| "lessThan": "7395dfacfff65e9938ac0889dafa1ab01e987d15", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "include/net/netfilter/nf_tables.h", |
| "net/netfilter/nf_tables_api.c", |
| "net/netfilter/nft_set_hash.c", |
| "net/netfilter/nft_set_pipapo.c", |
| "net/netfilter/nft_set_rbtree.c" |
| ], |
| "versions": [ |
| { |
| "version": "4.1", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "4.1", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.19.320", |
| "lessThanOrEqual": "4.19.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.4.282", |
| "lessThanOrEqual": "5.4.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.10.224", |
| "lessThanOrEqual": "5.10.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.165", |
| "lessThanOrEqual": "5.15.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1.97", |
| "lessThanOrEqual": "6.1.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.6.84", |
| "lessThanOrEqual": "6.6.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.7.5", |
| "lessThanOrEqual": "6.7.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.8", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.1", |
| "versionEndExcluding": "4.19.320" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.1", |
| "versionEndExcluding": "5.4.282" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.1", |
| "versionEndExcluding": "5.10.224" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.1", |
| "versionEndExcluding": "5.15.165" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.1", |
| "versionEndExcluding": "6.1.97" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.1", |
| "versionEndExcluding": "6.6.84" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.1", |
| "versionEndExcluding": "6.7.5" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.1", |
| "versionEndExcluding": "6.8" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/f8dfda798650241c1692058713ca4fef8e429061" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/eaf1a29ea5d7dba8e84e9e9f3b3f47d0cd540bfe" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/7b17de2a71e56c10335b565cc7ad238e6d984379" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/b45176b869673417ace338b87cf9cdb66e2eeb01" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/7fa2e2960fff8322ce2ded57b5f8e9cbc450b967" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/383182db8d58c4237772ba0764cded4938a235c3" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/7395dfacfff65e9938ac0889dafa1ab01e987d15" |
| } |
| ], |
| "title": "netfilter: nf_tables: use timestamp to check for set element timeout", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2024-27397", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |