Release Date: | 2024-04-24 |
In the Linux kernel, the following vulnerability has been resolved:\nnetfilter: nft_set_pipapo: do not free live element\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern. Quoting Pablo:\nadd_elem('00000000') timeout 100 ms\n...\nadd_elem('0000000X') timeout 100 ms\ndel_elem('0000000X') <---------------- delete one that was just added\n...\nadd_elem('00005000') timeout 100 ms\n1) nft_pipapo_remove() removes element 0000000X\nThen, KASAN shows a splat.\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\nv2: avoid uneeded temporary variable (Stefano)
See more information about CVE-2024-26924 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.1 metrics and score provided are preliminary and subject to review.
Base Score: | 5.5 | CVSS Vector: | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Attack Vector: | Local network | Attack Complexity: | Low |
Privileges Required: | Low | User Interaction: | None |
Scope: | Unchanged | Confidentiality Impact: | None |
Integrity Impact: | None | Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 8 (kernel) | ELSA-2024-8856 | 2024-11-05 |
Oracle Linux version 9 (kernel) | ELSA-2024-9315 | 2024-11-14 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: