CVE-2024-56637

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Hold module reference while requesting a module User space may unload ip_set.ko while it is itself requesting a set type backend module, leading to a kernel crash. The race condition may be provoked by inserting an mdelay() right after the nfnl_unlock() call.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*

History

07 Oct 2025, 20:27

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
CWE CWE-362
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: ipset: Mantener la referencia del módulo mientras se solicita un módulo El espacio de usuario puede descargar ip_set.ko mientras solicita un módulo de backend de tipo set, lo que provoca un bloqueo del kernel. La condición de ejecución puede provocarse insertando un mdelay() justo después de la llamada nfnl_unlock().
References () https://git.kernel.org/stable/c/0e67805e805c1f3edd6f43adbe08ea14b552694b - () https://git.kernel.org/stable/c/0e67805e805c1f3edd6f43adbe08ea14b552694b - Patch
References () https://git.kernel.org/stable/c/456f010bfaefde84d3390c755eedb1b0a5857c3c - () https://git.kernel.org/stable/c/456f010bfaefde84d3390c755eedb1b0a5857c3c - Patch
References () https://git.kernel.org/stable/c/5bae60a933ba5d16eed55c6b279be51bcbbc79b0 - () https://git.kernel.org/stable/c/5bae60a933ba5d16eed55c6b279be51bcbbc79b0 - Patch
References () https://git.kernel.org/stable/c/6099b5d3e37145484fac4b8b4070c3f1abfb3519 - () https://git.kernel.org/stable/c/6099b5d3e37145484fac4b8b4070c3f1abfb3519 - Patch
References () https://git.kernel.org/stable/c/90bf312a6b6b3d6012137f6776a4052ee85e0340 - () https://git.kernel.org/stable/c/90bf312a6b6b3d6012137f6776a4052ee85e0340 - Patch
References () https://git.kernel.org/stable/c/ba5e070f36682d07ca7ad2a953e6c9d96be19dca - () https://git.kernel.org/stable/c/ba5e070f36682d07ca7ad2a953e6c9d96be19dca - Patch
References () https://git.kernel.org/stable/c/e5e2d3024753fdaca818b822e3827614bacbdccf - () https://git.kernel.org/stable/c/e5e2d3024753fdaca818b822e3827614bacbdccf - Patch

27 Dec 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 15:15

Updated : 2025-10-07 20:27


NVD link : CVE-2024-56637

Mitre link : CVE-2024-56637

CVE.ORG link : CVE-2024-56637


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')