THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-26643

netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout

AssignerLinux
Reserved2024-02-19
Published2024-03-21
Updated2024-06-21

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout While the rhashtable set gc runs asynchronously, a race allows it to collect elements from anonymous sets with timeouts while it is being released from the commit path. Mingi Cho originally reported this issue in a different path in 6.1.x with a pipapo set with low timeouts which is not possible upstream since 7395dfacfff6 ("netfilter: nf_tables: use timestamp to check for set element timeout"). Fix this by setting on the dead flag for anonymous sets to skip async gc in this case. According to 08e4c8c5919f ("netfilter: nf_tables: mark newset as dead on transaction abort"), Florian plans to accelerate abort path by releasing objects via workqueue, therefore, this sets on the dead flag for abort path too.

Product status

Default status
unaffected

8da1b048f9a5 before d75a589bb92a
affected

bbdb3b65aa91 before edcf1a3f182e
affected

448be0774882 before e2d45f467096
affected

d19e8bf3ea41 before 291cca35818b
affected

ea3eb9f2192e before 406b0241d0eb
affected

5f68718b34a5 before b2d6f9a5b1cf
affected

5f68718b34a5 before 5224afbc30c3
affected

5f68718b34a5 before 552705a3650b
affected

Default status
affected

6.5
affected

Any version before 6.5
unaffected

5.4.274
unaffected

5.10.215
unaffected

5.15.154
unaffected

6.1.84
unaffected

6.6.24
unaffected

6.7.12
unaffected

6.8
unaffected

References

https://git.kernel.org/stable/c/d75a589bb92af1abf3b779cfcd1977ca11b27033

https://git.kernel.org/stable/c/edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf

https://git.kernel.org/stable/c/e2d45f467096e931044f0ab7634499879d851a5c

https://git.kernel.org/stable/c/291cca35818bd52a407bc37ab45a15816039e363

https://git.kernel.org/stable/c/406b0241d0eb598a0b330ab20ae325537d8d8163

https://git.kernel.org/stable/c/b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1

https://git.kernel.org/stable/c/5224afbc30c3ca9ba23e752f0f138729b2c48dd8

https://git.kernel.org/stable/c/552705a3650bbf46a22b1adedc1b04181490fc36

cve.org CVE-2024-26643

nvd.nist.gov CVE-2024-26643

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-26643
© Copyright 2024 THREATINT. Made in Cyprus with +