Executive Summary

Informations
Name CVE-2024-56655 First vendor Publication 2024-12-27
Vendor Cve Last vendor Modification 2025-06-04

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: do not defer rule destruction via call_rcu

nf_tables_chain_destroy can sleep, it can't be used from call_rcu callbacks.

Moreover, nf_tables_rule_release() is only safe for error unwinding, while transaction mutex is held and the to-be-desroyed rule was not exposed to either dataplane or dumps, as it deactives+frees without the required synchronize_rcu() in-between.

nft_rule_expr_deactivate() callbacks will change ->use counters of other chains/sets, see e.g. nft_lookup .deactivate callback, these must be serialized via transaction mutex.

Also add a few lockdep asserts to make this more explicit.

Calling synchronize_rcu() isn't ideal, but fixing this without is hard and way more intrusive. As-is, we can get:

WARNING: .. net/netfilter/nf_tables_api.c:5515 nft_set_destroy+0x.. Workqueue: events nf_tables_trans_destroy_work RIP: 0010:nft_set_destroy+0x3fe/0x5c0 Call Trace:

nf_tables_trans_destroy_work+0x6b7/0xad0
process_one_work+0x64a/0xce0
worker_thread+0x613/0x10d0

In case the synchronize_rcu becomes an issue, we can explore alternatives.

One way would be to allocate nft_trans_rule objects + one nft_trans_chain object, deactivate the rules + the chain and then defer the freeing to the nft destroy workqueue. We'd still need to keep the synchronize_rcu path as a fallback to handle -ENOMEM corner cases though.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56655

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3703

Sources (Detail)

https://git.kernel.org/stable/c/27f0574253f6c24c8ee4e3f0a685b75ed3a256ed
https://git.kernel.org/stable/c/2991dc357a28b61c13ed1f7b59e9251e2b4562fb
https://git.kernel.org/stable/c/5146c27b2780aac59876a887a5f4e793b8949862
https://git.kernel.org/stable/c/7cf0bd232b565d9852cb25fd094f77254773e048
https://git.kernel.org/stable/c/b04df3da1b5c6f6dc7cdccc37941740c078c4043
https://git.kernel.org/stable/c/b0f013bebf94fe7ae75e5a53be2f2bd1cc1841e3
https://git.kernel.org/stable/c/b8d8f53e1858178882b881b8c09f94ef0e83bf76
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Date Informations
2025-07-15 02:41:13
  • Multiple Updates
2025-07-14 12:38:30
  • Multiple Updates
2025-06-26 02:38:28
  • Multiple Updates
2025-06-25 12:36:32
  • Multiple Updates
2025-06-24 02:43:06
  • Multiple Updates
2025-06-04 17:20:44
  • Multiple Updates
2025-05-27 02:48:31
  • Multiple Updates
2025-05-26 21:21:17
  • Multiple Updates
2025-03-29 03:44:25
  • Multiple Updates
2025-03-28 13:47:41
  • Multiple Updates
2025-03-28 03:22:13
  • Multiple Updates
2025-03-19 03:17:03
  • Multiple Updates
2025-03-18 03:30:02
  • Multiple Updates
2025-03-14 03:17:10
  • Multiple Updates
2025-03-06 14:13:42
  • Multiple Updates
2025-02-22 03:27:14
  • Multiple Updates
2025-01-08 00:20:56
  • Multiple Updates
2025-01-07 03:08:10
  • Multiple Updates
2025-01-07 00:20:43
  • Multiple Updates
2024-12-27 21:20:28
  • First insertion