{"id":"AZL-40565","summary":"CVE-2024-27396 affecting package hyperv-daemons for versions less than 6.6.35.1-1","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gtp: Fix Use-After-Free in gtp_dellink\n\nSince call_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof gtp_dellink, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.","modified":"2026-04-01T05:14:40.516921Z","published":"2024-05-14T15:12:27Z","upstream":["CVE-2024-27396"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27396"}],"affected":[{"package":{"name":"hyperv-daemons","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/hyperv-daemons"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.35.1-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-40565.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}