net: gtp: Fix Use-After-Free in gtp_dellink
Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal
of gtp_dellink, is not part of the RCU read critical section, it
is possible that the RCU grace period will pass during the traversal and
the key will be free.
To prevent this, it should be changed to hlist_for_each_entry_safe.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-3840-1 | linux security update |
![]() |
DLA-3842-1 | linux-5.10 security update |
![]() |
USN-6896-1 | Linux kernel vulnerabilities |
![]() |
USN-6896-2 | Linux kernel vulnerabilities |
![]() |
USN-6896-3 | Linux kernel vulnerabilities |
![]() |
USN-6896-4 | Linux kernel vulnerabilities |
![]() |
USN-6896-5 | Linux kernel vulnerabilities |
![]() |
USN-6898-1 | Linux kernel vulnerabilities |
![]() |
USN-6898-2 | Linux kernel vulnerabilities |
![]() |
USN-6898-3 | Linux kernel kernel vulnerabilities |
![]() |
USN-6898-4 | Linux kernel vulnerabilities |
![]() |
USN-6917-1 | Linux kernel vulnerabilities |
![]() |
USN-6919-1 | Linux kernel vulnerabilities |
![]() |
USN-6927-1 | Linux kernel vulnerabilities |
![]() |
USN-6949-1 | Linux kernel vulnerabilities |
![]() |
USN-6949-2 | Linux kernel vulnerabilities |
![]() |
USN-6952-1 | Linux kernel vulnerabilities |
![]() |
USN-6955-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-7019-1 | Linux kernel vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 14 Jan 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Debian
Debian debian Linux Linux Linux linux Kernel |
|
CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* |
|
Vendors & Products |
Debian
Debian debian Linux Linux Linux linux Kernel |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 06 Nov 2024 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Metrics |
ssvc
|
Thu, 19 Sep 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-416 |

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T12:55:30.840Z
Reserved: 2024-02-25T13:47:42.677Z
Link: CVE-2024-27396

Updated: 2024-08-02T00:34:52.256Z

Status : Analyzed
Published: 2024-05-14T15:12:27.983
Modified: 2025-01-14T14:26:09.117
Link: CVE-2024-27396


No data.