The following table lists the changes that have been made to the
CVE-2024-54683 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by 416baaa9-dc9f-4396-8d5f-8c081fb06d67Jan. 11, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: netfilter: IDLETIMER: Fix for possible ABBA deadlock
Deletion of the last rule referencing a given idletimer may happen at
the same time as a read of its file in sysfs:| ======================================================
| WARNING: possible circular locking dependency detected
| 6.12.0-rc7-01692-g5e9a28f41134-dirty #594 Not tainted
| ——————————————————
| iptables/3303 is trying to acquire lock:
| ffff8881057e04b8 (kn->active#48){++++}-{0:0}, at: __kernfs_remove+0x20
|
| but task is already holding lock:
| ffffffffa0249068 (list_mutex){+.+.}-{3:3}, at: idletimer_tg_destroy_v]
|
| which lock already depends on the new lock.A simple reproducer is:
| #!/bin/bash
|
| while true; do
| iptables -A INPUT -i foo -j IDLETIMER –timeout 10 –label “testme”
| iptables -D INPUT -i foo -j IDLETIMER –timeout 10 –label “testme”
| done &
| while true; do
| cat /sys/class/xt_idletimer/timers/testme >/dev/null
| doneAvoid this by freeing list_mutex right after deleting the element from
the list, then continuing with the teardown.Added Reference https://git.kernel.org/stable/c/45fe76573a2557f632e248cc141342233f422b9a Added Reference https://git.kernel.org/stable/c/8c2c8445cda8f59c38dec7dc10509bcb23ae26a0 Added Reference https://git.kernel.org/stable/c/f36b01994d68ffc253c8296e2228dfe6e6431c03