In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout
While the rhashtable set gc runs asynchronously, a race allows it to
collect elements from anonymous sets with timeouts while it is being
released from the commit path.
Mingi Cho originally reported this issue in a different path in 6.1.x
with a pipapo set with low timeouts which is not possible upstream since
7395dfacfff6 ("netfilter: nf_tables: use timestamp to check for set
element timeout").
Fix this by setting on the dead flag for anonymous sets to skip async gc
in this case.
According to 08e4c8c5919f ("netfilter: nf_tables: mark newset as dead on
transaction abort"), Florian plans to accelerate abort path by releasing
objects via workqueue, therefore, this sets on the dead flag for abort
path too.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
13 Mar 2025, 21:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/291cca35818bd52a407bc37ab45a15816039e363 - Patch | |
References | () https://git.kernel.org/stable/c/406b0241d0eb598a0b330ab20ae325537d8d8163 - Patch | |
References | () https://git.kernel.org/stable/c/5224afbc30c3ca9ba23e752f0f138729b2c48dd8 - Patch | |
References | () https://git.kernel.org/stable/c/552705a3650bbf46a22b1adedc1b04181490fc36 - Patch | |
References | () https://git.kernel.org/stable/c/b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1 - Patch | |
References | () https://git.kernel.org/stable/c/d75a589bb92af1abf3b779cfcd1977ca11b27033 - Patch | |
References | () https://git.kernel.org/stable/c/e2d45f467096e931044f0ab7634499879d851a5c - Patch | |
References | () https://git.kernel.org/stable/c/edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
CWE | CWE-667 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/291cca35818bd52a407bc37ab45a15816039e363 - | |
References | () https://git.kernel.org/stable/c/406b0241d0eb598a0b330ab20ae325537d8d8163 - | |
References | () https://git.kernel.org/stable/c/5224afbc30c3ca9ba23e752f0f138729b2c48dd8 - | |
References | () https://git.kernel.org/stable/c/552705a3650bbf46a22b1adedc1b04181490fc36 - | |
References | () https://git.kernel.org/stable/c/b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1 - | |
References | () https://git.kernel.org/stable/c/d75a589bb92af1abf3b779cfcd1977ca11b27033 - | |
References | () https://git.kernel.org/stable/c/e2d45f467096e931044f0ab7634499879d851a5c - | |
References | () https://git.kernel.org/stable/c/edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf - |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jun 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Apr 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Apr 2024, 15:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Mar 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-21 11:15
Updated : 2025-03-13 21:20
NVD link : CVE-2024-26643
Mitre link : CVE-2024-26643
CVE.ORG link : CVE-2024-26643
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-667
Improper Locking