In the Linux kernel, the following vulnerability has been resolved:
netfilter: ipset: Hold module reference while requesting a module
User space may unload ipset.ko while it is itself requesting a set type backend module, leading to a kernel crash. The race condition may be provoked by inserting an mdelay() right after the nfnlunlock() call.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56637.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56637.json"
[
{
"signature_version": "v1",
"target": {
"file": "net/netfilter/ipset/ip_set_core.c",
"function": "load_settype"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@456f010bfaefde84d3390c755eedb1b0a5857c3c",
"deprecated": false,
"digest": {
"function_hash": "39746008613157608860002258194337403657",
"length": 327.0
},
"id": "CVE-2024-56637-44c2ca01",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "net/netfilter/ipset/ip_set_core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@456f010bfaefde84d3390c755eedb1b0a5857c3c",
"deprecated": false,
"digest": {
"line_hashes": [
"305888000200000000931783162239205323741",
"56438281193938995515330103950946392103",
"73687757764666876259172027551225422966",
"246511673921181238959834329124034224572",
"314983044261822120688091999426232205852",
"173395125946258669341042886263410733746",
"200739862729523210235375367356670708340",
"2441158508264803255838135325752865456",
"81519219506282454371278264345063660752",
"36400142316750837102278508773438255751",
"23895538954876771200611591638983294869",
"283385401824119874858505027048143923366"
],
"threshold": 0.9
},
"id": "CVE-2024-56637-8cfcd1fc",
"signature_type": "Line"
}
]