• CVE-2024-27395

发布时间: 2024年5月24日

修改时间: 2025年1月18日

概要

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Fix Use-After-Free in ovs_ct_exit Since kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal of ovs_ct_limit_exit, is not part of the RCU read critical section, it is possible that the RCU grace period will pass during the traversal and the key will be free. To prevent this, it should be changed to hlist_for_each_entry_safe.

CVSS v3 指标

NVD openEuler
Confidentiality High None
Attack Vector Local Local
CVSS评分 7.8 5.5
Attack Complexity Low High
Privileges Required Low High
Scope Unchanged Unchanged
Integrity High None
User Interaction None None
Availability High None

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-4667 In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Fix Use-After-Free in ovs_ct_exit Since kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal of ovs_ct_limit_exit, is not part of the RCU read critical section, it is possible that the RCU grace period will pass during the traversal and the key will be free. To prevent this, it should be changed to hlist_for_each_entry_safe. 2024年5月24日
KylinSec-SA-2024-4778 kernel security update 2024年5月24日
KylinSec-SA-2024-4953 kernel security update 2024年5月24日

影响产品

产品 状态
KY3.4-4A kernel Fixed
KY3.4-5A kernel Fixed
KY3.5.1 kernel Fixed
KY3.5.2 kernel Fixed
V6 kernel Unaffected