CVE-2024-26910

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
17/04/2024
Last modified:
05/11/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: ipset: fix performance regression in swap operation<br /> <br /> The patch "netfilter: ipset: fix race condition between swap/destroy<br /> and kernel side add/del/test", commit 28628fa9 fixes a race condition.<br /> But the synchronize_rcu() added to the swap function unnecessarily slows<br /> it down: it can safely be moved to destroy and use call_rcu() instead.<br /> <br /> Eric Dumazet pointed out that simply calling the destroy functions as<br /> rcu callback does not work: sets with timeout use garbage collectors<br /> which need cancelling at destroy which can wait. Therefore the destroy<br /> functions are split into two: cancelling garbage collectors safely at<br /> executing the command received by netlink and moving the remaining<br /> part only into the rcu callback.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.269 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.210 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.149 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.79 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.18 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.6 (excluding)