In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generation mask can be updated while netlink dump is in progress. The pipapo set backend walk iterator cannot rely on it to infer what view of the datastructure is to be used. Add notation to specify if user wants to read/update the set. Based on patch from Florian Westphal.
https://git.kernel.org/stable/c/ff89db14c63a827066446460e39226c0688ef786
https://git.kernel.org/stable/c/f24d8abc2bb8cbf31ec713336e402eafa8f42f60
https://git.kernel.org/stable/c/ce9fef54c5ec9912a0c9a47bac3195cc41b14679
https://git.kernel.org/stable/c/721715655c72640567e8742567520c99801148ed
https://git.kernel.org/stable/c/52735a010f37580b3a569a996f878fdd87425650
https://git.kernel.org/stable/c/29b359cf6d95fd60730533f7f10464e95bd17c73