In the Linux kernel, the following vulnerability has been resolved: tcp: Fix Use-After-Free in tcp_ao_connect_init Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal of tcp_ao_connect_init, is not part of the RCU read critical section, it is possible that the RCU grace period will pass during the traversal and the key will be free. To prevent this, it should be changed to hlist_for_each_entry_safe.
History

Fri, 06 Sep 2024 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-09T16:37:11.495Z

Updated: 2024-11-05T09:21:24.590Z

Reserved: 2024-02-25T13:47:42.677Z

Link: CVE-2024-27394

cve-icon Vulnrichment

Updated: 2024-08-02T00:34:52.373Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-14T15:12:27.363

Modified: 2024-09-06T14:35:11.027

Link: CVE-2024-27394

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-05-08T00:00:00Z

Links: CVE-2024-27394 - Bugzilla