CVE-2024-39503

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the garbage collection of the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free. The patch contains the following parts: - When destroying all sets, first remove the garbage collectors, then wait if needed and then destroy the sets. - Fix the badly ordered "wait then remove gc" for the destroy a single set case. - Fix the missing rcu locking in the list:set type in the userspace test case. - Use proper RCU list handlings in the list:set type. The patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*

History

17 Sep 2025, 15:28

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0f1bb77c6d837c9513943bc7c08f04c5cc5c6568 - () https://git.kernel.org/stable/c/0f1bb77c6d837c9513943bc7c08f04c5cc5c6568 - Patch
References () https://git.kernel.org/stable/c/2ba35b37f780c6410bb4bba9c3072596d8576702 - () https://git.kernel.org/stable/c/2ba35b37f780c6410bb4bba9c3072596d8576702 - Patch
References () https://git.kernel.org/stable/c/390b353d1a1da3e9c6c0fd14fe650d69063c95d6 - () https://git.kernel.org/stable/c/390b353d1a1da3e9c6c0fd14fe650d69063c95d6 - Patch
References () https://git.kernel.org/stable/c/4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10 - () https://git.kernel.org/stable/c/4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10 - Patch
References () https://git.kernel.org/stable/c/90ae20d47de602198eb69e6cd7a3db3420abfc08 - () https://git.kernel.org/stable/c/90ae20d47de602198eb69e6cd7a3db3420abfc08 - Patch
References () https://git.kernel.org/stable/c/93b53c202b51a69e42ca57f5a183f7e008e19f83 - () https://git.kernel.org/stable/c/93b53c202b51a69e42ca57f5a183f7e008e19f83 - Patch
References () https://git.kernel.org/stable/c/c0761d1f1ce1d5b85b5e82bbb714df12de1aa8c3 - () https://git.kernel.org/stable/c/c0761d1f1ce1d5b85b5e82bbb714df12de1aa8c3 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
CWE CWE-416
CWE-362
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*

21 Nov 2024, 09:27

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0f1bb77c6d837c9513943bc7c08f04c5cc5c6568 - () https://git.kernel.org/stable/c/0f1bb77c6d837c9513943bc7c08f04c5cc5c6568 -
References () https://git.kernel.org/stable/c/2ba35b37f780c6410bb4bba9c3072596d8576702 - () https://git.kernel.org/stable/c/2ba35b37f780c6410bb4bba9c3072596d8576702 -
References () https://git.kernel.org/stable/c/390b353d1a1da3e9c6c0fd14fe650d69063c95d6 - () https://git.kernel.org/stable/c/390b353d1a1da3e9c6c0fd14fe650d69063c95d6 -
References () https://git.kernel.org/stable/c/4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10 - () https://git.kernel.org/stable/c/4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10 -
References () https://git.kernel.org/stable/c/90ae20d47de602198eb69e6cd7a3db3420abfc08 - () https://git.kernel.org/stable/c/90ae20d47de602198eb69e6cd7a3db3420abfc08 -
References () https://git.kernel.org/stable/c/93b53c202b51a69e42ca57f5a183f7e008e19f83 - () https://git.kernel.org/stable/c/93b53c202b51a69e42ca57f5a183f7e008e19f83 -
References () https://git.kernel.org/stable/c/c0761d1f1ce1d5b85b5e82bbb714df12de1aa8c3 - () https://git.kernel.org/stable/c/c0761d1f1ce1d5b85b5e82bbb714df12de1aa8c3 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: ipset: corrige la ejecución entre la limpieza del espacio de nombres y gc en el tipo list:set Lion Ackermann informó que existe una condición de ejecución entre la limpieza del espacio de nombres en ipset y la recolección de basura de la lista : establecer tipo. La limpieza del espacio de nombres puede destruir el tipo list:set de conjuntos mientras el gc del tipo set espera ejecutarse en la limpieza de rcu. Este último utiliza datos del conjunto destruido, lo que lleva a un uso posterior al gratuito. El parche contiene las siguientes partes: - Al destruir todos los conjuntos, primero retire los recolectores de basura, luego espere si es necesario y luego destruya los conjuntos. - Se corrigió el error "esperar y luego eliminar gc" mal ordenado para destruir un solo caso de conjunto. - Corrija el bloqueo de rcu que falta en la lista: establezca el tipo en el caso de prueba del espacio de usuario. - Utilice el manejo adecuado de la lista de RCU en el tipo list:set. El parche depende de c1193d9bbbd3 (netfilter: ipset: Agregar lista vaciada a cancel_gc).

12 Jul 2024, 16:34

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-09-17 15:28


NVD link : CVE-2024-39503

Mitre link : CVE-2024-39503

CVE.ORG link : CVE-2024-39503


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-416

Use After Free