| Summary | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry New test case fails unexpectedly when avx2 matching functions are used. The test first loads a ranomly generated pipapo set This works. Then, it reloads the set after a flush: This is expected to work, because its the same set after all and it was But with avx2, this fails: nft reports a clashing element. The reported clash is of following form: We successfully re-inserted Then we try to insert a . d avx2 finds the already existing a . d, which (due to 'flush set') is marked Due to incorrect masking, the skip-step finds the next matching i.e. we return the already reinserted "a . b", even though the No such error is reported for the generic c implementation (no avx2) or when Bisection points to Before this commit, the wrong element is returned, but erronously The root-cause is too early return in the avx2 match functions. |
|---|---|
| Publication Date | May 6, 2026, 7:16 p.m. |
| Registration Date | May 7, 2026, 4:08 a.m. |
| Last Update | May 6, 2026, 10:07 p.m. |