{"id":"CVE-2024-40993","summary":"netfilter: ipset: Fix suspicious rcu_dereference_protected()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: Fix suspicious rcu_dereference_protected()\n\nWhen destroying all sets, we are either in pernet exit phase or\nare executing a \"destroy all sets command\" from userspace. The latter\nwas taken into account in ip_set_dereference() (nfnetlink mutex is held),\nbut the former was not. The patch adds the required check to\nrcu_dereference_protected() in ip_set_dereference().","modified":"2026-03-20T12:37:28.607790Z","published":"2024-07-12T12:37:36.453Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40993.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3799d02ae4208af08e81310770d8754863a246a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3fc09e1ca854bc234e007a56e0f7431f5e2defb5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/523bed6489e089dd8040e72453fb79da47b144c2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/72d9611968867cc4c5509e7708b1507d692b797a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/788d585e62f487bc4536d454937f737b70d39a33"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8ecd06277a7664f4ef018abae3abd3451d64e7a6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/94dd411c18d7fff9e411555d5c662d29416501e4"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40993.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40993"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c0761d1f1ce1d5b85b5e82bbb714df12de1aa8c3"},{"fixed":"3799d02ae4208af08e81310770d8754863a246a1"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"93b53c202b51a69e42ca57f5a183f7e008e19f83"},{"fixed":"72d9611968867cc4c5509e7708b1507d692b797a"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0f1bb77c6d837c9513943bc7c08f04c5cc5c6568"},{"fixed":"523bed6489e089dd8040e72453fb79da47b144c2"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"390b353d1a1da3e9c6c0fd14fe650d69063c95d6"},{"fixed":"788d585e62f487bc4536d454937f737b70d39a33"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2ba35b37f780c6410bb4bba9c3072596d8576702"},{"fixed":"94dd411c18d7fff9e411555d5c662d29416501e4"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"90ae20d47de602198eb69e6cd7a3db3420abfc08"},{"fixed":"3fc09e1ca854bc234e007a56e0f7431f5e2defb5"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10"},{"fixed":"8ecd06277a7664f4ef018abae3abd3451d64e7a6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40993.json"}}],"schema_version":"1.7.5"}