Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-40546.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-40546
Upstream
Published
2024-05-14T15:12:28Z
Modified
2026-04-01T05:14:40.167410Z
Summary
CVE-2024-27397 affecting package hyperv-daemons for versions less than 6.6.56.1-1
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: use timestamp to check for set element timeout

Add a timestamp field at the beginning of the transaction, store it in the nftables per-netns area.

Update set backend .insert, .deactivate and sync gc path to use the timestamp, this avoids that an element expires while control plane transaction is still unfinished.

.lookup and .update, which are used from packet path, still use the current time to check if the element has expired. And .get path and dump also since this runs lockless under rcu read size lock. Then, there is async gc which also needs to check the current time since it runs asynchronously from a workqueue.

References

Affected packages

Azure Linux:3 / hyperv-daemons

Package

Name
hyperv-daemons
Purl
pkg:rpm/azure-linux/hyperv-daemons

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.56.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-40546.json"