{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-27431","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-25T13:47:42.686Z","datePublished":"2024-05-17T12:02:10.274Z","dateUpdated":"2026-05-12T11:51:37.909Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T20:10:40.695Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncpumap: Zero-initialise xdp_rxq_info struct before running XDP program\n\nWhen running an XDP program that is attached to a cpumap entry, we don't\ninitialise the xdp_rxq_info data structure being used in the xdp_buff\nthat backs the XDP program invocation. Tobias noticed that this leads to\nrandom values being returned as the xdp_md->rx_queue_index value for XDP\nprograms running in a cpumap.\n\nThis means we're basically returning the contents of the uninitialised\nmemory, which is bad. Fix this by zero-initialising the rxq data\nstructure before running the XDP program."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/bpf/cpumap.c"],"versions":[{"version":"9216477449f33cdbc9c9a99d49f500b7fbb81702","lessThan":"5f4e51abfbe6eb444fa91906a5cd083044278297","status":"affected","versionType":"git"},{"version":"9216477449f33cdbc9c9a99d49f500b7fbb81702","lessThan":"f0363af9619c77730764f10360e36c6445c12f7b","status":"affected","versionType":"git"},{"version":"9216477449f33cdbc9c9a99d49f500b7fbb81702","lessThan":"3420b3ff1ff489c177ea1cb7bd9fbbc4e9a0be95","status":"affected","versionType":"git"},{"version":"9216477449f33cdbc9c9a99d49f500b7fbb81702","lessThan":"f562e4c4aab00986dde3093c4be919c3f2b85a4a","status":"affected","versionType":"git"},{"version":"9216477449f33cdbc9c9a99d49f500b7fbb81702","lessThan":"eaa7cb836659ced2d9f814ac32aa3ec193803ed6","status":"affected","versionType":"git"},{"version":"9216477449f33cdbc9c9a99d49f500b7fbb81702","lessThan":"2487007aa3b9fafbd2cb14068f49791ce1d7ede5","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/bpf/cpumap.c"],"versions":[{"version":"5.9","status":"affected"},{"version":"0","lessThan":"5.9","status":"unaffected","versionType":"semver"},{"version":"5.10.213","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.152","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.82","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.22","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.10","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"5.10.213"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"5.15.152"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.1.82"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.6.22"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.7.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/5f4e51abfbe6eb444fa91906a5cd083044278297"},{"url":"https://git.kernel.org/stable/c/f0363af9619c77730764f10360e36c6445c12f7b"},{"url":"https://git.kernel.org/stable/c/3420b3ff1ff489c177ea1cb7bd9fbbc4e9a0be95"},{"url":"https://git.kernel.org/stable/c/f562e4c4aab00986dde3093c4be919c3f2b85a4a"},{"url":"https://git.kernel.org/stable/c/eaa7cb836659ced2d9f814ac32aa3ec193803ed6"},{"url":"https://git.kernel.org/stable/c/2487007aa3b9fafbd2cb14068f49791ce1d7ede5"}],"title":"cpumap: Zero-initialise xdp_rxq_info struct before running XDP program","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-908","lang":"en","description":"CWE-908 Use of Uninitialized Resource"}]}],"affected":[{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"9216477449f3","status":"affected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"5.9","status":"affected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"5.10.213","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"5.15.152","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.1.82","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.6.22","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.7.10","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.8","status":"unaffected"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.5,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-05-17T16:29:06.840486Z","id":"CVE-2024-27431","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-23T21:49:35.963Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:34:52.315Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/5f4e51abfbe6eb444fa91906a5cd083044278297","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/f0363af9619c77730764f10360e36c6445c12f7b","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/3420b3ff1ff489c177ea1cb7bd9fbbc4e9a0be95","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/f562e4c4aab00986dde3093c4be919c3f2b85a4a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/eaa7cb836659ced2d9f814ac32aa3ec193803ed6","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/2487007aa3b9fafbd2cb14068f49791ce1d7ede5","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","tags":["x_transferred"]}]},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T11:51:37.909Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"}]}]},"dataVersion":"5.2"}