Логотип exploitDog
bind: "CVE-2024-39503"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-39503"

Количество 13

Количество 13

ubuntu логотип

CVE-2024-39503

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the garbage collection of the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free. The patch contains the following parts: - When destroying all sets, first remove the garbage collectors, then wait if needed and then destroy the sets. - Fix the badly ordered "wait then remove gc" for the destroy a single set case. - Fix the missing rcu locking in the list:set type in the userspace test case. - Use proper RCU list handlings in the list:set type. The patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2024-39503

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the garbage collection of the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free. The patch contains the following parts: - When destroying all sets, first remove the garbage collectors, then wait if needed and then destroy the sets. - Fix the badly ordered "wait then remove gc" for the destroy a single set case. - Fix the missing rcu locking in the list:set type in the userspace test case. - Use proper RCU list handlings in the list:set type. The patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2024-39503

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the garbage collection of the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free. The patch contains the following parts: - When destroying all sets, first remove the garbage collectors, then wait if needed and then destroy the sets. - Fix the badly ordered "wait then remove gc" for the destroy a single set case. - Fix the missing rcu locking in the list:set type in the userspace test case. - Use proper RCU list handlings in the list:set type. The patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2024-39503

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-r75c-r77g-h7h2

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the garbage collection of the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free. The patch contains the following parts: - When destroying all sets, first remove the garbage collectors, then wait if needed and then destroy the sets. - Fix the badly ordered "wait then remove gc" for the destroy a single set case. - Fix the missing rcu locking in the list:set type in the userspace test case. - Use proper RCU list handlings in the list:set type. The patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).

CVSS3: 7
EPSS: Низкий
fstec логотип

BDU:2024-10986

больше 1 года назад

Уязвимость компонента ipset ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе

CVSS3: 8.8
EPSS: Низкий
rocky логотип

RLSA-2024:8856

около 1 года назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-8856

около 1 года назад

ELSA-2024-8856: kernel security update (MODERATE)

EPSS: Низкий
redos логотип

ROS-20241205-02

12 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 8.8
EPSS: Низкий
oracle-oval логотип

ELSA-2024-12585

больше 1 года назад

ELSA-2024-12585: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12584

больше 1 года назад

ELSA-2024-12584: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12581

больше 1 года назад

ELSA-2024-12581: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9315

около 1 года назад

ELSA-2024-9315: kernel security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-39503

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the garbage collection of the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free. The patch contains the following parts: - When destroying all sets, first remove the garbage collectors, then wait if needed and then destroy the sets. - Fix the badly ordered "wait then remove gc" for the destroy a single set case. - Fix the missing rcu locking in the list:set type in the userspace test case. - Use proper RCU list handlings in the list:set type. The patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).

CVSS3: 7
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-39503

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the garbage collection of the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free. The patch contains the following parts: - When destroying all sets, first remove the garbage collectors, then wait if needed and then destroy the sets. - Fix the badly ordered "wait then remove gc" for the destroy a single set case. - Fix the missing rcu locking in the list:set type in the userspace test case. - Use proper RCU list handlings in the list:set type. The patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).

CVSS3: 6.4
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-39503

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the garbage collection of the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free. The patch contains the following parts: - When destroying all sets, first remove the garbage collectors, then wait if needed and then destroy the sets. - Fix the badly ordered "wait then remove gc" for the destroy a single set case. - Fix the missing rcu locking in the list:set type in the userspace test case. - Use proper RCU list handlings in the list:set type. The patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).

CVSS3: 7
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-39503

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 7
0%
Низкий
больше 1 года назад
github логотип
GHSA-r75c-r77g-h7h2

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the garbage collection of the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free. The patch contains the following parts: - When destroying all sets, first remove the garbage collectors, then wait if needed and then destroy the sets. - Fix the badly ordered "wait then remove gc" for the destroy a single set case. - Fix the missing rcu locking in the list:set type in the userspace test case. - Use proper RCU list handlings in the list:set type. The patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).

CVSS3: 7
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-10986

Уязвимость компонента ipset ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе

CVSS3: 8.8
0%
Низкий
больше 1 года назад
rocky логотип
RLSA-2024:8856

Moderate: kernel security update

около 1 года назад
oracle-oval логотип
ELSA-2024-8856

ELSA-2024-8856: kernel security update (MODERATE)

около 1 года назад
redos логотип
ROS-20241205-02

Множественные уязвимости kernel-lt

CVSS3: 8.8
12 месяцев назад
oracle-oval логотип
ELSA-2024-12585

ELSA-2024-12585: Unbreakable Enterprise kernel-container security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12584

ELSA-2024-12584: Unbreakable Enterprise kernel-container security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12581

ELSA-2024-12581: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-9315

ELSA-2024-9315: kernel security update (MODERATE)

около 1 года назад

Уязвимостей на страницу