[SRU][J/N/Q][PATCH 0/1] CVE-2026-23274
Tim Whisonant
tim.whisonant at canonical.com
Thu Mar 26 00:51:24 UTC 2026
SRU Justification:
[Impact]
netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels
IDLETIMER revision 0 rules reuse existing timers by label and always call
mod_timer() on timer->timer.
If the label was created first by revision 1 with XT_IDLETIMER_ALARM,
the object uses alarm timer semantics and timer->timer is never initialized.
Reusing that object from revision 0 causes mod_timer() on an uninitialized
timer_list, triggering debugobjects warnings and possible panic when
panic_on_warn=1.
Fix this by rejecting revision 0 rule insertion when an existing timer with
the same label is of ALARM type.
[Fix]
Questing: cherry picked from upstream
Noble: applied Jammy patch
Jammy: cherry picked from upstream
Focal: not affected
Bionic: not affected
Xenial: not affected
Trusty: not affected
[Test Plan]
Compile and boot tested.
[Where problems could occur]
The change affects the Netfilter module for manipulating
timers on packet match, fixing a potential kernel panic
when panic_on_warn is set. Any issues would affect clients
of the type of timers created with XT_IDLETIMER_ALARM.
Yuan Tan (1):
netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels
net/netfilter/xt_IDLETIMER.c | 6 ++++++
1 file changed, 6 insertions(+)
--
2.43.0
More information about the kernel-team
mailing list