In the Linux kernel, the following vulnerability has been resolved: net: gtp: Fix Use-After-Free in gtp_dellink Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal of gtp_dellink, is not part of the RCU read critical section, it is possible that the RCU grace period will pass during the traversal and the key will be free. To prevent this, it should be changed to hlist_for_each_entry_safe.
History

Wed, 06 Nov 2024 08:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Sep 2024 10:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-09T16:37:18.867Z

Updated: 2024-11-05T09:21:26.821Z

Reserved: 2024-02-25T13:47:42.677Z

Link: CVE-2024-27396

cve-icon Vulnrichment

Updated: 2024-08-02T00:34:52.256Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-14T15:12:27.983

Modified: 2024-11-05T10:16:29.910

Link: CVE-2024-27396

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-05-08T00:00:00Z

Links: CVE-2024-27396 - Bugzilla