ACK: [SRU][J/N/Q][PATCH 0/1] CVE-2026-23278
Massimiliano Pellizzer
massimiliano.pellizzer at canonical.com
Mon May 4 07:55:40 UTC 2026
On Thu, 23 Apr 2026 at 20:12, Tim Whisonant <tim.whisonant at canonical.com> wrote:
>
> SRU Justification:
>
> [Impact]
>
> netfilter: nf_tables: always walk all pending catchall elements
>
> During transaction processing we might have more than one catchall element:
> 1 live catchall element and 1 pending element that is coming as part of the
> new batch.
>
> If the map holding the catchall elements is also going away, its
> required to toggle all catchall elements and not just the first viable
> candidate.
>
> Otherwise, we get:
> WARNING: ./include/net/netfilter/nf_tables.h:1281 at nft_data_release+0xb7/0xe0 [nf_tables], CPU#2: nft/1404
> RIP: 0010:nft_data_release+0xb7/0xe0 [nf_tables]
> [..]
> __nft_set_elem_destroy+0x106/0x380 [nf_tables]
> nf_tables_abort_release+0x348/0x8d0 [nf_tables]
> nf_tables_abort+0xcf2/0x3ac0 [nf_tables]
> nfnetlink_rcv_batch+0x9c9/0x20e0 [..]
>
> [Fix]
>
> Questing: applied Noble patch
> Noble: cherry picked from upstream
> Jammy: backported from upstream
> Focal: not affected
> Bionic: not affected
> Xenial: not affected
> Trusty: not affected
>
> [Test Plan]
>
> Compile and boot tested.
>
> [Where problems could occur]
>
> The change affects netfilter's nftables catchall set objects
> code responsible for activating and deactivating these catchall
> elements. Failures might manifest as incorrectly deactivated
> or activated catchall elements.
>
> Florian Westphal (1):
> netfilter: nf_tables: always walk all pending catchall elements
>
> net/netfilter/nf_tables_api.c | 2 --
> 1 file changed, 2 deletions(-)
>
> --
> 2.43.0
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
Acked-by: Massimiliano Pellizzer <massimiliano.pellizzer at canonical.com>
--
Massimiliano Pellizzer
More information about the kernel-team
mailing list