netfilter:ipset:修复交换操作中的性能回归 (CVE-2024-26910)

CVE编号

CVE-2024-26910

利用情况

暂无

补丁情况

N/A

披露时间

2024-04-18
漏洞描述
In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: fix performance regression in swap operation

The patch "netfilter: ipset: fix race condition between swap/destroy
and kernel side add/del/test", commit 28628fa9 fixes a race condition.
But the synchronize_rcu() added to the swap function unnecessarily slows
it down: it can safely be moved to destroy and use call_rcu() instead.

Eric Dumazet pointed out that simply calling the destroy functions as
rcu callback does not work: sets with timeout use garbage collectors
which need cancelling at destroy which can wait. Therefore the destroy
functions are split into two: cancelling garbage collectors safely at
executing the command received by netlink and moving the remaining
part only into the rcu callback.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_12 linux * Up to
(excluding)
6.1.82-1
运行在以下环境
系统 linux linux_kernel * Up to
(excluding)
5.4.269
运行在以下环境
系统 linux linux_kernel * From
(including)
5.11
Up to
(excluding)
5.15.149
运行在以下环境
系统 linux linux_kernel * From
(including)
5.16
Up to
(excluding)
6.1.79
运行在以下环境
系统 linux linux_kernel * From
(including)
5.5
Up to
(excluding)
5.10.210
运行在以下环境
系统 linux linux_kernel * From
(including)
6.2
Up to
(excluding)
6.6.18
运行在以下环境
系统 linux linux_kernel * From
(including)
6.7
Up to
(excluding)
6.7.6
CVSS3评分
4.7
  • 攻击路径
    本地
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-362 使用共享资源的并发执行不恰当同步问题(竞争条件)
阿里云安全产品覆盖情况