Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-27396

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-09 May, 2024 | 16:37
Updated At-04 May, 2025 | 12:55
Rejected At-
Credits

net: gtp: Fix Use-After-Free in gtp_dellink

In the Linux kernel, the following vulnerability has been resolved: net: gtp: Fix Use-After-Free in gtp_dellink Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal of gtp_dellink, is not part of the RCU read critical section, it is possible that the RCU grace period will pass during the traversal and the key will be free. To prevent this, it should be changed to hlist_for_each_entry_safe.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:09 May, 2024 | 16:37
Updated At:04 May, 2025 | 12:55
Rejected At:
▼CVE Numbering Authority (CNA)
net: gtp: Fix Use-After-Free in gtp_dellink

In the Linux kernel, the following vulnerability has been resolved: net: gtp: Fix Use-After-Free in gtp_dellink Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal of gtp_dellink, is not part of the RCU read critical section, it is possible that the RCU grace period will pass during the traversal and the key will be free. To prevent this, it should be changed to hlist_for_each_entry_safe.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/gtp.c
Default Status
unaffected
Versions
Affected
  • From 043a283d24f40fea4c8a8d06b0e2694c8e372200 before 07b20d0a3dc13fb1adff10b60021a4924498da58 (git)
  • From c185e1d6e2752a4b656c3ca878c525fa11f55757 before 718df1bc226c383dd803397d7f5d95557eb81ac7 (git)
  • From 94dc550a5062030569d4aa76e10e50c8fc001930 before 0caff3e6390f840666b8dc1ecebf985c2ef3f1dd (git)
  • From 94dc550a5062030569d4aa76e10e50c8fc001930 before 2e74b3fd6bf542349758f283676dff3660327c07 (git)
  • From 94dc550a5062030569d4aa76e10e50c8fc001930 before 25a1c2d4b1fcf938356a9688a96a6456abd44b29 (git)
  • From 94dc550a5062030569d4aa76e10e50c8fc001930 before 2aacd4de45477582993f8a8abb9505a06426bfb6 (git)
  • From 94dc550a5062030569d4aa76e10e50c8fc001930 before cd957d1716ec979d8f5bf38fc659aeb9fdaa2474 (git)
  • From 94dc550a5062030569d4aa76e10e50c8fc001930 before f2a904107ee2b647bb7794a1a82b67740d7c8a64 (git)
  • a29c4303930bc0c25ae6a4f365dcdef71447b4ea (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/gtp.c
Default Status
affected
Versions
Affected
  • 5.5
Unaffected
  • From 0 before 5.5 (semver)
  • From 4.19.313 through 4.19.* (semver)
  • From 5.4.275 through 5.4.* (semver)
  • From 5.10.216 through 5.10.* (semver)
  • From 5.15.158 through 5.15.* (semver)
  • From 6.1.90 through 6.1.* (semver)
  • From 6.6.30 through 6.6.* (semver)
  • From 6.8.9 through 6.8.* (semver)
  • From 6.9 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/07b20d0a3dc13fb1adff10b60021a4924498da58
N/A
https://git.kernel.org/stable/c/718df1bc226c383dd803397d7f5d95557eb81ac7
N/A
https://git.kernel.org/stable/c/0caff3e6390f840666b8dc1ecebf985c2ef3f1dd
N/A
https://git.kernel.org/stable/c/2e74b3fd6bf542349758f283676dff3660327c07
N/A
https://git.kernel.org/stable/c/25a1c2d4b1fcf938356a9688a96a6456abd44b29
N/A
https://git.kernel.org/stable/c/2aacd4de45477582993f8a8abb9505a06426bfb6
N/A
https://git.kernel.org/stable/c/cd957d1716ec979d8f5bf38fc659aeb9fdaa2474
N/A
https://git.kernel.org/stable/c/f2a904107ee2b647bb7794a1a82b67740d7c8a64
N/A
Hyperlink: https://git.kernel.org/stable/c/07b20d0a3dc13fb1adff10b60021a4924498da58
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/718df1bc226c383dd803397d7f5d95557eb81ac7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0caff3e6390f840666b8dc1ecebf985c2ef3f1dd
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2e74b3fd6bf542349758f283676dff3660327c07
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/25a1c2d4b1fcf938356a9688a96a6456abd44b29
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2aacd4de45477582993f8a8abb9505a06426bfb6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cd957d1716ec979d8f5bf38fc659aeb9fdaa2474
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f2a904107ee2b647bb7794a1a82b67740d7c8a64
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/07b20d0a3dc13fb1adff10b60021a4924498da58
x_transferred
https://git.kernel.org/stable/c/718df1bc226c383dd803397d7f5d95557eb81ac7
x_transferred
https://git.kernel.org/stable/c/0caff3e6390f840666b8dc1ecebf985c2ef3f1dd
x_transferred
https://git.kernel.org/stable/c/2e74b3fd6bf542349758f283676dff3660327c07
x_transferred
https://git.kernel.org/stable/c/25a1c2d4b1fcf938356a9688a96a6456abd44b29
x_transferred
https://git.kernel.org/stable/c/2aacd4de45477582993f8a8abb9505a06426bfb6
x_transferred
https://git.kernel.org/stable/c/cd957d1716ec979d8f5bf38fc659aeb9fdaa2474
x_transferred
https://git.kernel.org/stable/c/f2a904107ee2b647bb7794a1a82b67740d7c8a64
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
x_transferred
Hyperlink: https://git.kernel.org/stable/c/07b20d0a3dc13fb1adff10b60021a4924498da58
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/718df1bc226c383dd803397d7f5d95557eb81ac7
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/0caff3e6390f840666b8dc1ecebf985c2ef3f1dd
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/2e74b3fd6bf542349758f283676dff3660327c07
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/25a1c2d4b1fcf938356a9688a96a6456abd44b29
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/2aacd4de45477582993f8a8abb9505a06426bfb6
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/cd957d1716ec979d8f5bf38fc659aeb9fdaa2474
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/f2a904107ee2b647bb7794a1a82b67740d7c8a64
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:14 May, 2024 | 15:12
Updated At:14 Jan, 2025 | 14:26

In the Linux kernel, the following vulnerability has been resolved: net: gtp: Fix Use-After-Free in gtp_dellink Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal of gtp_dellink, is not part of the RCU read critical section, it is possible that the RCU grace period will pass during the traversal and the key will be free. To prevent this, it should be changed to hlist_for_each_entry_safe.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.14.162(inclusive) to 4.15(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.19.93(inclusive) to 4.19.313(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.4.8(inclusive) to 5.4.275(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.216(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.158(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.90(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.30(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.8.9(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.9
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.9
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.9
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.9
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.9
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Primarynvd@nist.gov
CWE ID: CWE-416
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/07b20d0a3dc13fb1adff10b60021a4924498da58416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/0caff3e6390f840666b8dc1ecebf985c2ef3f1dd416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/25a1c2d4b1fcf938356a9688a96a6456abd44b29416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/2aacd4de45477582993f8a8abb9505a06426bfb6416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/2e74b3fd6bf542349758f283676dff3660327c07416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/718df1bc226c383dd803397d7f5d95557eb81ac7416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/cd957d1716ec979d8f5bf38fc659aeb9fdaa2474416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/f2a904107ee2b647bb7794a1a82b67740d7c8a64416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/07b20d0a3dc13fb1adff10b60021a4924498da58af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/0caff3e6390f840666b8dc1ecebf985c2ef3f1ddaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/25a1c2d4b1fcf938356a9688a96a6456abd44b29af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/2aacd4de45477582993f8a8abb9505a06426bfb6af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/2e74b3fd6bf542349758f283676dff3660327c07af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/718df1bc226c383dd803397d7f5d95557eb81ac7af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/cd957d1716ec979d8f5bf38fc659aeb9fdaa2474af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/f2a904107ee2b647bb7794a1a82b67740d7c8a64af854a3a-2127-422b-91ae-364da2661108
Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Hyperlink: https://git.kernel.org/stable/c/07b20d0a3dc13fb1adff10b60021a4924498da58
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/0caff3e6390f840666b8dc1ecebf985c2ef3f1dd
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/25a1c2d4b1fcf938356a9688a96a6456abd44b29
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/2aacd4de45477582993f8a8abb9505a06426bfb6
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/2e74b3fd6bf542349758f283676dff3660327c07
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/718df1bc226c383dd803397d7f5d95557eb81ac7
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/cd957d1716ec979d8f5bf38fc659aeb9fdaa2474
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f2a904107ee2b647bb7794a1a82b67740d7c8a64
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/07b20d0a3dc13fb1adff10b60021a4924498da58
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/0caff3e6390f840666b8dc1ecebf985c2ef3f1dd
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/25a1c2d4b1fcf938356a9688a96a6456abd44b29
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/2aacd4de45477582993f8a8abb9505a06426bfb6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/2e74b3fd6bf542349758f283676dff3660327c07
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/718df1bc226c383dd803397d7f5d95557eb81ac7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/cd957d1716ec979d8f5bf38fc659aeb9fdaa2474
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f2a904107ee2b647bb7794a1a82b67740d7c8a64
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found