CVE-2024-40993

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix suspicious rcu_dereference_protected() When destroying all sets, we are either in pernet exit phase or are executing a "destroy all sets command" from userspace. The latter was taken into account in ip_set_dereference() (nfnetlink mutex is held), but the former was not. The patch adds the required check to rcu_dereference_protected() in ip_set_dereference().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.1.95:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6.35:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*

History

No history.

Information

Published : 2024-07-12 13:15

Updated : 2025-11-03 22:17


NVD link : CVE-2024-40993

Mitre link : CVE-2024-40993

CVE.ORG link : CVE-2024-40993


JSON object : View

Products Affected

linux

  • linux_kernel