摘要:
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ipset: Fix suspicious rcu_dereference_protected()
When destroying all sets, we are either in pernet exit phase or
are executing a "destroy all sets command" from userspace. The latter
was taken into account in ip_set_dereference() (nfnetlink mutex is held),
but the former was not. The patch adds the required check to
rcu_dereference_protected() in ip_set_dereference().
安全等级: Low
公告ID: KylinSec-SA-2024-3266
发布日期: 2024年8月6日
关联CVE: CVE-2024-40993
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ipset: Fix suspicious rcu_dereference_protected()
When destroying all sets, we are either in pernet exit phase or
are executing a "destroy all sets command" from userspace. The latter
was taken into account in ip_set_dereference() (nfnetlink mutex is held),
but the former was not. The patch adds the required check to
rcu_dereference_protected() in ip_set_dereference().
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-40993 | KY3.4-5A | kernel | Unaffected |
CVE-2024-40993 | KY3.5.2 | kernel | Unaffected |
CVE-2024-40993 | V6 | kernel | Unaffected |