VYPR
High severity7.8NVD Advisory· Published May 14, 2024· Updated May 12, 2026

CVE-2024-27396

CVE-2024-27396

Description

In the Linux kernel, the following vulnerability has been resolved:

net: gtp: Fix Use-After-Free in gtp_dellink

Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal of gtp_dellink, is not part of the RCU read critical section, it is possible that the RCU grace period will pass during the traversal and the key will be free.

To prevent this, it should be changed to hlist_for_each_entry_safe.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Linux kernel GTP driver due to improper RCU traversal in gtp_dellink, allowing local privilege escalation.

Vulnerability

Description

CVE-2024-27396 is a use-after-free vulnerability in the Linux kernel's GTP (GPRS Tunneling Protocol) driver. The bug resides in the gtp_dellink function, which uses hlist_for_each_entry_rcu to traverse a list of keys. During this traversal, call_rcu is invoked, but it is not protected by an RCU read-side critical section. Consequently, the RCU grace period can expire while the traversal is still in progress, leading to the premature freeing of a key and subsequent use-after-free.

Exploitation

Exploitation requires local access to the system and the ability to trigger the gtp_dellink operation, typically by removing a GTP link. No special privileges beyond local user access are necessary to initiate the vulnerable code path. The attacker must be able to create and delete GTP interfaces, which may be restricted in some environments but is generally achievable from user space.

Impact

A successful exploit could allow an attacker to cause a denial of service (system crash) or potentially escalate privileges to gain arbitrary code execution in kernel context. The use-after-free condition can be leveraged to corrupt kernel memory, leading to full system compromise.

Mitigation

The fix was applied in the Linux kernel stable tree by replacing hlist_for_each_entry_rcu with hlist_for_each_entry_safe, ensuring that the traversal is safe against concurrent removal. Users should update to a patched kernel version. Siemens has also acknowledged the vulnerability in their product advisory SSA-265688 [1], listing affected products such as the SIMATIC S7-1500 TM MFP - GNU/Linux subsystem, and recommends applying the provided remediation.

References
  1. SSA-265688

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

115

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

0

No linked articles in our index yet.