We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generation mask can be updated while netlink dump is in progress. The pipapo set backend walk iterator cannot rely on it to infer what view of the datastructure is to be used. Add notation to specify if user wants to read/update the set. Based on patch from Florian Westphal.
Reserved 2024-02-19 | Published 2024-05-01 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/ff89db14c63a827066446460e39226c0688ef786
git.kernel.org/...c/ce9fef54c5ec9912a0c9a47bac3195cc41b14679
git.kernel.org/...c/52735a010f37580b3a569a996f878fdd87425650
git.kernel.org/...c/f24d8abc2bb8cbf31ec713336e402eafa8f42f60
git.kernel.org/...c/721715655c72640567e8742567520c99801148ed
git.kernel.org/...c/29b359cf6d95fd60730533f7f10464e95bd17c73
Support options