Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-53088
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-19 Nov, 2024 | 17:45
Updated At-03 Nov, 2025 | 22:29
Rejected At-
▼CVE Numbering Authority (CNA)
i40e: fix race condition by adding filter's intermediate sync state

In the Linux kernel, the following vulnerability has been resolved: i40e: fix race condition by adding filter's intermediate sync state Fix a race condition in the i40e driver that leads to MAC/VLAN filters becoming corrupted and leaking. Address the issue that occurs under heavy load when multiple threads are concurrently modifying MAC/VLAN filters by setting mac and port VLAN. 1. Thread T0 allocates a filter in i40e_add_filter() within i40e_ndo_set_vf_port_vlan(). 2. Thread T1 concurrently frees the filter in __i40e_del_filter() within i40e_ndo_set_vf_mac(). 3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which refers to the already freed filter memory, causing corruption. Reproduction steps: 1. Spawn multiple VFs. 2. Apply a concurrent heavy load by running parallel operations to change MAC addresses on the VFs and change port VLANs on the host. 3. Observe errors in dmesg: "Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX, please set promiscuous on manually for VF XX". Exact code for stable reproduction Intel can't open-source now. The fix involves implementing a new intermediate filter state, I40E_FILTER_NEW_SYNC, for the time when a filter is on a tmp_add_list. These filters cannot be deleted from the hash list directly but must be removed using the full process.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/ethernet/intel/i40e/i40e.h
  • drivers/net/ethernet/intel/i40e/i40e_debugfs.c
  • drivers/net/ethernet/intel/i40e/i40e_main.c
Default Status
unaffected
Versions
Affected
  • From 278e7d0b9d6864a9749b9473a273892aa1528621 before 262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a (git)
  • From 278e7d0b9d6864a9749b9473a273892aa1528621 before 7ad3fb3bfd43feb4e15c81dffd23ac4e55742791 (git)
  • From 278e7d0b9d6864a9749b9473a273892aa1528621 before bf5f837d9fd27d32fb76df0a108babcaf4446ff1 (git)
  • From 278e7d0b9d6864a9749b9473a273892aa1528621 before 6e046f4937474bc1b9fa980c1ad8f3253fc638f6 (git)
  • From 278e7d0b9d6864a9749b9473a273892aa1528621 before f30490e9695ef7da3d0899c6a0293cc7cd373567 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/ethernet/intel/i40e/i40e.h
  • drivers/net/ethernet/intel/i40e/i40e_debugfs.c
  • drivers/net/ethernet/intel/i40e/i40e_main.c
Default Status
affected
Versions
Affected
  • 4.10
Unaffected
  • From 0 before 4.10 (semver)
  • From 5.15.172 through 5.15.* (semver)
  • From 6.1.117 through 6.1.* (semver)
  • From 6.6.61 through 6.6.* (semver)
  • From 6.11.8 through 6.11.* (semver)
  • From 6.12 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a
N/A
https://git.kernel.org/stable/c/7ad3fb3bfd43feb4e15c81dffd23ac4e55742791
N/A
https://git.kernel.org/stable/c/bf5f837d9fd27d32fb76df0a108babcaf4446ff1
N/A
https://git.kernel.org/stable/c/6e046f4937474bc1b9fa980c1ad8f3253fc638f6
N/A
https://git.kernel.org/stable/c/f30490e9695ef7da3d0899c6a0293cc7cd373567
N/A
Hyperlink: https://git.kernel.org/stable/c/262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7ad3fb3bfd43feb4e15c81dffd23ac4e55742791
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/bf5f837d9fd27d32fb76df0a108babcaf4446ff1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6e046f4937474bc1b9fa980c1ad8f3253fc638f6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f30490e9695ef7da3d0899c6a0293cc7cd373567
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-362CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Type: CWE
CWE ID: CWE-362
Description: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Metrics
VersionBase scoreBase severityVector
3.14.7MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Resource: N/A
Details not found