ACK: [SRU][F/J][PATCH v2 0/1] CVE-2024-27397

Cengiz Can cengiz.can at canonical.com
Tue Sep 3 19:32:18 UTC 2024


On 02-09-24 16:37:44, Massimiliano Pellizzer wrote:
> [Impact]
> 
> Add a timestamp field at the beginning of the transaction, store it
> in the nftables per-netns area.
> 
> Update set backend .insert, .deactivate and sync gc path to use the
> timestamp, this avoids that an element expires while control plane
> transaction is still unfinished.
> 
> .lookup and .update, which are used from packet path, still use the
> current time to check if the element has expired. And .get path and dump
> also since this runs lockless under rcu read size lock. Then, there is
> async gc which also needs to check the current time since it runs
> asynchronously from a workqueue.
> 
> [Fix]
> 
> Noble:  Fixed
> Jammy:  Cherry picked from linux-5.15.y
> Focal:  Backported from linux-5.4.y
> Bionic: Sent to ESM ML
> Xenial: Sent to ESM ML
> 
> [Test Case]
> 
> Compile and boot tested.
> 
> [Where problems could occur]
> 
> The fix for CVE-2024-27397 affects the netfilter subsystem.
> An issue with this fix may lead to kernel crashes, particularly during
> the application or modification of network filtering rules.
> Users may also notice unexpected network behavior.
> 
> [Changes between v1 and v2]
> Fixed a typo in the commit description.
> 
> Pablo Neira Ayuso (1):
>   netfilter: nf_tables: use timestamp to check for set element timeout

Acked-by: Cengiz Can <cengiz.can at canonical.com>

> 
>  include/net/netfilter/nf_tables.h | 21 +++++++++++++++++++--
>  net/netfilter/nf_tables_api.c     |  1 +
>  net/netfilter/nft_set_hash.c      |  8 +++++++-
>  net/netfilter/nft_set_rbtree.c    |  6 ++++--
>  4 files changed, 31 insertions(+), 5 deletions(-)
> 
> -- 
> 2.43.0
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team



More information about the kernel-team mailing list