CVE-2024-27394

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27394
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27394.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27394
Downstream
Published
2024-05-09T16:37:11Z
Modified
2025-10-17T02:44:47.190360Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
tcp: Fix Use-After-Free in tcp_ao_connect_init
Details

In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix Use-After-Free in tcpaoconnect_init

Since callrcu, which is called in the hlistforeachentryrcu traversal of tcpaoconnectinit, is not part of the RCU read critical section, it is possible that the RCU grace period will pass during the traversal and the key will be free.

To prevent this, it should be changed to hlistforeachentrysafe.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7c2ffaf21bd67f73d21560995ce17eaf5fc1d37f
Fixed
ca4fb6c6764b3f75b4f5aa81db1536291897ff7f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7c2ffaf21bd67f73d21560995ce17eaf5fc1d37f
Fixed
80e679b352c3ce5158f3f778cfb77eb767e586fb

Affected versions

v6.*

v6.6
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.8.1
v6.8.2
v6.8.3
v6.8.4
v6.8.5
v6.8.6
v6.8.7
v6.8.8
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.8.9