๐Ÿ” CVE Alert

CVE-2024-53088

MEDIUM 4.7

i40e: fix race condition by adding filter's intermediate sync state

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: i40e: fix race condition by adding filter's intermediate sync state Fix a race condition in the i40e driver that leads to MAC/VLAN filters becoming corrupted and leaking. Address the issue that occurs under heavy load when multiple threads are concurrently modifying MAC/VLAN filters by setting mac and port VLAN. 1. Thread T0 allocates a filter in i40e_add_filter() within i40e_ndo_set_vf_port_vlan(). 2. Thread T1 concurrently frees the filter in __i40e_del_filter() within i40e_ndo_set_vf_mac(). 3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which refers to the already freed filter memory, causing corruption. Reproduction steps: 1. Spawn multiple VFs. 2. Apply a concurrent heavy load by running parallel operations to change MAC addresses on the VFs and change port VLANs on the host. 3. Observe errors in dmesg: "Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX, please set promiscuous on manually for VF XX". Exact code for stable reproduction Intel can't open-source now. The fix involves implementing a new intermediate filter state, I40E_FILTER_NEW_SYNC, for the time when a filter is on a tmp_add_list. These filters cannot be deleted from the hash list directly but must be removed using the full process.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 19, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
278e7d0b9d6864a9749b9473a273892aa1528621 < 262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a 278e7d0b9d6864a9749b9473a273892aa1528621 < 7ad3fb3bfd43feb4e15c81dffd23ac4e55742791 278e7d0b9d6864a9749b9473a273892aa1528621 < bf5f837d9fd27d32fb76df0a108babcaf4446ff1 278e7d0b9d6864a9749b9473a273892aa1528621 < 6e046f4937474bc1b9fa980c1ad8f3253fc638f6 278e7d0b9d6864a9749b9473a273892aa1528621 < f30490e9695ef7da3d0899c6a0293cc7cd373567
Linux / Linux
4.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a git.kernel.org: https://git.kernel.org/stable/c/7ad3fb3bfd43feb4e15c81dffd23ac4e55742791 git.kernel.org: https://git.kernel.org/stable/c/bf5f837d9fd27d32fb76df0a108babcaf4446ff1 git.kernel.org: https://git.kernel.org/stable/c/6e046f4937474bc1b9fa980c1ad8f3253fc638f6 git.kernel.org: https://git.kernel.org/stable/c/f30490e9695ef7da3d0899c6a0293cc7cd373567 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html