A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.
Workaround:
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:2394 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-42756 | patch third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2239848 | patch exploit third party advisory issue tracking |
https://seclists.org/oss-sec/2023/q3/242 | patch mailing list exploit third party advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/ |