{"vulnerability": "CVE-2024-53088", "sightings": [{"uuid": "c08921bc-c3d2-40fe-aeb2-3b6b8aabac07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-53088", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "9d83daea-06f4-4f59-95f6-7ec68e2c20fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53088", "type": "seen", "source": "https://t.me/cvedetector/11491", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53088 - Intel i40e Linux Kernel MAC/VLAN Filter Race Condition Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53088 \nPublished : Nov. 19, 2024, 6:15 p.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ni40e: fix race condition by adding filter's intermediate sync state  \n  \nFix a race condition in the i40e driver that leads to MAC/VLAN filters  \nbecoming corrupted and leaking. Address the issue that occurs under  \nheavy load when multiple threads are concurrently modifying MAC/VLAN  \nfilters by setting mac and port VLAN.  \n  \n1. Thread T0 allocates a filter in i40e_add_filter() within  \n        i40e_ndo_set_vf_port_vlan().  \n2. Thread T1 concurrently frees the filter in __i40e_del_filter() within  \n        i40e_ndo_set_vf_mac().  \n3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which  \n        refers to the already freed filter memory, causing corruption.  \n  \nReproduction steps:  \n1. Spawn multiple VFs.  \n2. Apply a concurrent heavy load by running parallel operations to change  \n        MAC addresses on the VFs and change port VLANs on the host.  \n3. Observe errors in dmesg:  \n\"Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX,  \n please set promiscuous on manually for VF XX\".  \n  \nExact code for stable reproduction Intel can't open-source now.  \n  \nThe fix involves implementing a new intermediate filter state,  \nI40E_FILTER_NEW_SYNC, for the time when a filter is on a tmp_add_list.  \nThese filters cannot be deleted from the hash list directly but  \nmust be removed using the full process. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T20:09:52.000000Z"}]}