In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not compare internal table flags on updates The Linux kernel CVE team has assigned CVE-2024-27065 to this issue. Upstream advisory: https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-27065-8c9d@gregkh/T
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2278381]
I don't see any security implication of the fixed bug. Florian, Zack, Alex, do you?
In reply to comment #10: > I don't see any security implication of the fixed bug. Florian, Zack, Alex, > do you? I decrease it to Low. Based on that incorrect behavior in the nf_tables_updtable can lead to security issue (ex. see older https://access.redhat.com/security/cve/CVE-2023-1095 ), I cannot say if this is not a bug at all.
(In reply to Alex from comment #11) > In reply to comment #10: > > I don't see any security implication of the fixed bug. Florian, Zack, Alex, > > do you? > > I decrease it to Low. Thanks, Alex! > Based on that incorrect behavior in the nf_tables_updtable can lead to > security issue (ex. see older > https://access.redhat.com/security/cve/CVE-2023-1095 ), I cannot say if this > is not a bug at all. Sure, this is undoubtedly a bug. I merely want to reduce the required effort to deal with it. Is it acceptable to not z-stream CVE fixes if they are low severity? A bit off-topic, but CVE-2023-1095 seems fishy, too: The bug is a call to list_del() for an element not on a list. The respective list_head object has a defined value though (it was allocated by kzalloc()). The behaviour is deterministic and immutable AIUI, so not exploitable per se?
(In reply to Phil Sutter from comment #12) > [...] Is it acceptable to not z-stream CVE fixes if they are low > severity? Please ignore this question. I just skimmed 27.6. CVE process[1] in RHEL devel guide which is unambiguous. [1] https://one.redhat.com/rhel-development-guide/#assembly_cve-process_assembly_security-practices
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4823 https://access.redhat.com/errata/RHSA-2024:4823
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4831 https://access.redhat.com/errata/RHSA-2024:4831
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:5102 https://access.redhat.com/errata/RHSA-2024:5102
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:5101 https://access.redhat.com/errata/RHSA-2024:5101
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:5363 https://access.redhat.com/errata/RHSA-2024:5363