| 概要 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry New test case fails unexpectedly when avx2 matching functions are used. The test first loads a ranomly generated pipapo set This works. Then, it reloads the set after a flush: This is expected to work, because its the same set after all and it was But with avx2, this fails: nft reports a clashing element. The reported clash is of following form: We successfully re-inserted Then we try to insert a . d avx2 finds the already existing a . d, which (due to 'flush set') is marked Due to incorrect masking, the skip-step finds the next matching i.e. we return the already reinserted "a . b", even though the No such error is reported for the generic c implementation (no avx2) or when Bisection points to Before this commit, the wrong element is returned, but erronously The root-cause is too early return in the avx2 match functions. |
|---|---|
| 公表日 | 2026年5月6日19:16 |
| 登録日 | 2026年5月7日4:08 |
| 最終更新日 | 2026年5月6日22:07 |