CVE-2024-53088
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
19/11/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
i40e: fix race condition by adding filter&#39;s intermediate sync state<br />
<br />
Fix a race condition in the i40e driver that leads to MAC/VLAN filters<br />
becoming corrupted and leaking. Address the issue that occurs under<br />
heavy load when multiple threads are concurrently modifying MAC/VLAN<br />
filters by setting mac and port VLAN.<br />
<br />
1. Thread T0 allocates a filter in i40e_add_filter() within<br />
i40e_ndo_set_vf_port_vlan().<br />
2. Thread T1 concurrently frees the filter in __i40e_del_filter() within<br />
i40e_ndo_set_vf_mac().<br />
3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which<br />
refers to the already freed filter memory, causing corruption.<br />
<br />
Reproduction steps:<br />
1. Spawn multiple VFs.<br />
2. Apply a concurrent heavy load by running parallel operations to change<br />
MAC addresses on the VFs and change port VLANs on the host.<br />
3. Observe errors in dmesg:<br />
"Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX,<br />
please set promiscuous on manually for VF XX".<br />
<br />
Exact code for stable reproduction Intel can&#39;t open-source now.<br />
<br />
The fix involves implementing a new intermediate filter state,<br />
I40E_FILTER_NEW_SYNC, for the time when a filter is on a tmp_add_list.<br />
These filters cannot be deleted from the hash list directly but<br />
must be removed using the full process.
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 5.15.172 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.117 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.61 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a
- https://git.kernel.org/stable/c/6e046f4937474bc1b9fa980c1ad8f3253fc638f6
- https://git.kernel.org/stable/c/7ad3fb3bfd43feb4e15c81dffd23ac4e55742791
- https://git.kernel.org/stable/c/bf5f837d9fd27d32fb76df0a108babcaf4446ff1
- https://git.kernel.org/stable/c/f30490e9695ef7da3d0899c6a0293cc7cd373567
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



