CVE-2023-52924
05.02.2025, 10:15
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: don't skip expired elements during walk
There is an asymmetry between commit/abort and preparation phase if the
following conditions are met:
1. set is a verdict map ("1.2.3.4 : jump foo")
2. timeouts are enabled
In this case, following sequence is problematic:
1. element E in set S refers to chain C
2. userspace requests removal of set S
3. kernel does a set walk to decrement chain->use count for all elements
from preparation phase
4. kernel does another set walk to remove elements from the commit phase
(or another walk to do a chain->use increment for all elements from
abort phase)
If E has already expired in 1), it will be ignored during list walk, so its use count
won't have been changed.
Then, when set is culled, ->destroy callback will zap the element via
nf_tables_set_elem_destroy(), but this function is only safe for
elements that have been deactivated earlier from the preparation phase:
lack of earlier deactivate removes the element but leaks the chain use
count, which results in a WARN splat when the chain gets removed later,
plus a leak of the nft_chain structure.
Update pipapo_get() not to skip expired elements, otherwise flush
command reports bogus ENOENT errors.Enginsight| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.1 ≤ 𝑥 < 4.19.316 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.262 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.198 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.134 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.56 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.4.11 |
| linux | linux_kernel | 6.5:rc1 |
| linux | linux_kernel | 6.5:rc2 |
| linux | linux_kernel | 6.5:rc3 |
| linux | linux_kernel | 6.5:rc4 |
| linux | linux_kernel | 6.5:rc5 |
𝑥
= Vulnerable software versions
Debian Releases
References