Bug 2280437 (CVE-2024-27396) - CVE-2024-27396 kernel: net: gtp: Fix Use-After-Free in gtp_dellink
Summary: CVE-2024-27396 kernel: net: gtp: Fix Use-After-Free in gtp_dellink
Keywords:
Status: NEW
Alias: CVE-2024-27396
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2280438
Blocks: 2280439
TreeView+ depends on / blocked
 
Reported: 2024-05-14 23:32 UTC by Robb Gatica
Modified: 2024-09-18 15:52 UTC (History)
49 users (show)

Fixed In Version: kernel 4.19.313, kernel 5.4.275, kernel 5.10.216, kernel 5.15.158, kernel 6.1.90, kernel 6.6.30, kernel 6.8.9, kernel 6.9-rc6
Doc Type: If docs needed, set a value
Doc Text:
A use-after-free vulnerability was found in the GPRS Tunneling Protocol (GTP) subsystem of the Linux kernel. This issue arises from improper management of memory resources in the gtp_dellink function. This flaw allows an attacker with local access or network capabilities to execute arbitrary code or crash the system, leading to potential system compromise or denial of service.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Robb Gatica 2024-05-14 23:32:01 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: gtp: Fix Use-After-Free in gtp_dellink

The Linux kernel CVE team has assigned CVE-2024-27396 to this issue.

Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024050837-CVE-2024-27396-e9af@gregkh/T

Comment 1 Robb Gatica 2024-05-14 23:32:37 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2280438]

Comment 3 Alex 2024-06-09 13:39:26 UTC
The result of automatic check (that is developed by Alexander Larkin) for this CVE-2024-27396 is: 	SKIP	No affected files built, so skip this CVE	NO			-	-	unknown (where first YES/NO value means if related sources built).


Note You need to log in before you can comment on or make changes to this bug.