-
Notifications
You must be signed in to change notification settings - Fork 509
Open
Description
I have some question about CVE-2024-26809.
To trigger this vulnerability, we should set pipapo-set's dirty as true, and then delete the set. The method of author is in a same netlink, first insert a elem-D and then delete the pipapo_set.
But when the kernel run function nft_commit(), this will first address NFT_MSG_NEWSETELEM, then the dirty will be set false. After that kernel will run nft_pipapo_destroy, this time dirty already is false, how can we trigger the vulnerability?
Metadata
Metadata
Assignees
Labels
No labels