- Description
- In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix suspicious rcu_dereference_protected() When destroying all sets, we are either in pernet exit phase or are executing a "destroy all sets command" from userspace. The latter was taken into account in ip_set_dereference() (nfnetlink mutex is held), but the former was not. The patch adds the required check to rcu_dereference_protected() in ip_set_dereference().
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Modified
- Products
- linux_kernel
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
- Hype score
- Not currently trending
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C0F47F-CC5A-4962-A13F-F2632DEBE9D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6.35:*:*:*:*:*:*:*",
"matchCriteriaId": "24BA51FC-6014-49BB-A4E3-0C0211421E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BA2678D2-361E-4A41-AD4D-DBFA70AD14D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]