First published: Wed May 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generation mask can be updated while netlink dump is in progress. The pipapo set backend walk iterator cannot rely on it to infer what view of the datastructure is to be used. Add notation to specify if user wants to read/update the set. Based on patch from Florian Westphal.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.8.8 | 6.8.8 |
redhat/kernel | <6.9 | 6.9 |
Linux kernel | >=6.4<6.8.8 | |
Linux kernel | =6.9-rc1 | |
Linux kernel | =6.9-rc2 | |
Linux kernel | =6.9-rc3 | |
Linux kernel | =6.9-rc4 | |
Fedora | =38 | |
Fedora | =39 | |
Fedora | =40 | |
debian/linux | <=5.10.223-1 | 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
debian/linux-6.1 | 6.1.128-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27017 is classified as a moderate severity vulnerability in the Linux kernel.
To fix CVE-2024-27017, please update your kernel to at least version 6.8.8 or apply the appropriate patches for the affected distributions.
CVE-2024-27017 affects several Linux distributions including Red Hat, Debian, and Fedora.
CVE-2024-27017 involves the netfilter component specifically related to the pipapo set backend walk iterator.
There is no known workaround for CVE-2024-27017, so updating the kernel is the recommended action.