CVE-2024-40993

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-40993
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40993.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-40993
Downstream
Published
2024-07-12T13:15:20Z
Modified
2025-09-17T14:56:35Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: Fix suspicious rcudereferenceprotected()

When destroying all sets, we are either in pernet exit phase or are executing a "destroy all sets command" from userspace. The latter was taken into account in ipsetdereference() (nfnetlink mutex is held), but the former was not. The patch adds the required check to rcudereferenceprotected() in ipsetdereference().

References

Affected packages