{"id":"CVE-2024-27395","summary":"net: openvswitch: Fix Use-After-Free in ovs_ct_exit","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: Fix Use-After-Free in ovs_ct_exit\n\nSince kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof ovs_ct_limit_exit, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.","modified":"2026-03-20T12:35:25.195942Z","published":"2024-05-09T16:37:15.196Z","related":["MGASA-2024-0263","MGASA-2024-0266","SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27395.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2db9a8c0a01fa1c762c1e61a13c212c492752994"},{"type":"WEB","url":"https://git.kernel.org/stable/c/35880c3fa6f8fe281a19975d2992644588ca33d3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/589523cf0b384164e445dd5db8d5b1bf97982424"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5ea7b72d4fac2fdbc0425cd8f2ea33abe95235b2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9048616553c65e750d43846f225843ed745ec0d4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bca6fa2d9a9f560e6b89fd5190b05cc2f5d422c1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eaa5e164a2110d2fb9e16c8a29e4501882235137"},{"type":"WEB","url":"https://git.kernel.org/stable/c/edee0758747d7c219e29db9ed1d4eb33e8d32865"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27395.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27395"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"11efd5cb04a184eea4f57b68ea63dddd463158d1"},{"fixed":"2db9a8c0a01fa1c762c1e61a13c212c492752994"},{"fixed":"589523cf0b384164e445dd5db8d5b1bf97982424"},{"fixed":"35880c3fa6f8fe281a19975d2992644588ca33d3"},{"fixed":"9048616553c65e750d43846f225843ed745ec0d4"},{"fixed":"bca6fa2d9a9f560e6b89fd5190b05cc2f5d422c1"},{"fixed":"eaa5e164a2110d2fb9e16c8a29e4501882235137"},{"fixed":"edee0758747d7c219e29db9ed1d4eb33e8d32865"},{"fixed":"5ea7b72d4fac2fdbc0425cd8f2ea33abe95235b2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27395.json"}}],"schema_version":"1.7.5"}