In the Linux kernel, the following vulnerability has been resolved:
netfilter: ipset: Fix suspicious rcu_dereference_protected()
When destroying all sets, we are either in pernet exit phase or
are executing a "destroy all sets command" from userspace. The latter
was taken into account in ip_set_dereference() (nfnetlink mutex is held),
but the former was not. The patch adds the required check to
rcu_dereference_protected() in ip_set_dereference().
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-07-12 13:15
Updated : 2025-11-03 22:17
NVD link : CVE-2024-40993
Mitre link : CVE-2024-40993
CVE.ORG link : CVE-2024-40993
JSON object : View
Products Affected
linux
- linux_kernel
CWE
