In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: use timestamp to check for set element timeout
Add a timestamp field at the beginning of the transaction, store it
in the nftables per-netns area.
Update set backend .insert, .deactivate and sync gc path to use the
timestamp, this avoids that an element expires while control plane
transaction is still unfinished.
.lookup and .update, which are used from packet path, still use the
current time to check if the element has expired. And .get path and dump
also since this runs lockless under rcu read size lock. Then, there is
async gc which also needs to check the current time since it runs
asynchronously from a workqueue.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 18 Sep 2025 17:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Linux Linux linux Kernel | |
| Weaknesses | CWE-416 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | |
| Vendors & Products | Linux Linux linux Kernel | 
Mon, 24 Mar 2025 15:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Thu, 19 Dec 2024 09:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Mon, 19 Aug 2024 04:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Tue, 13 Aug 2024 23:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_e4s:9.0 | 
Tue, 13 Aug 2024 06:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_e4s:9.0::nfv | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Linux
Published: 2024-05-09T16:37:22.463Z
Updated: 2025-05-04T09:04:07.736Z
Reserved: 2024-02-25T13:47:42.677Z
Link: CVE-2024-27397
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T00:34:52.250Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-05-14T15:12:28.240
Modified: 2025-09-18T17:20:51.250
Link: CVE-2024-27397
 Redhat
                        Redhat