ACK: [SRU][J/F][PATCH v4 0/1] CVE-2024-27012

Aaron Jauregui aaron.jauregui at canonical.com
Sun Aug 11 23:32:12 UTC 2024


On Fri, Aug 09, 2024 at 02:25:34PM +0200, Hannah Peuckmann wrote:
> [Impact]
> The existing code in nf_tables has an issue where set elements are not properly restored when the delete set operation fails.
> 
> [Fix]
> This patch ensures that all set elements are correctly handled during the delete operation, maintaining the integrity of the nf_tables.
> 
> Noble: done
> Jammy: applied, fixed context conflicts
> Focal: applied, fixed context conflicts
> Bionic: not affected
> Xenial: not affected
> Trusty: not affected
> 
> Focal and Jammy are missing the following commit:
> 0e1ea651c9717dd ("netfilter: nf_tables: shrink memory consumption of set elements")
> 
> This introduced context conflicts in nf_tables_api.c and for jammy also in nft_set_pipapo.c, but
> they aren't related to the fix and are relatively straightforward to resolve.
> 
> [v4 changes]
> 
> I adjusted the context in nft_map_catchall_deactivate again to handle elem.priv correctly.
> elem.priv is now being set first and passed to nft_setelem_data_deactivate afterwards.
> 
> 
> [Test Case]
> 
> Compiled and booted.
> 
> [Where problems could occur]
> 
> This fix affects those who use the nf_tables in netfilter. An issue with this fix could result in unexpected behaviour
> or inconsistencies in the netfilter tables.
> 
> 
> Pablo Neira Ayuso (1):
>   netfilter: nf_tables: restore set elements when delete set fails
> 
>  net/netfilter/nf_tables_api.c  | 25 +++++++++++++++++++++++++
>  net/netfilter/nft_set_bitmap.c |  4 +---
>  net/netfilter/nft_set_hash.c   |  8 ++------
>  net/netfilter/nft_set_rbtree.c |  4 +---
>  4 files changed, 29 insertions(+), 12 deletions(-)

Acked-by: Aaron Jauregui <aaron.jauregui at canonical.com>



More information about the kernel-team mailing list