In the Linux kernel, the following vulnerability has been resolved:
ipv6: mcast: remove one synchronizenet() barrier in ipv6mc_down()
As discussed in the past (commit 2d3916f31891 ("ipv6: fix skb drops in igmp6eventquery() and igmp6eventreport()")) I think the synchronizenet() call in ipv6mc_down() is not needed.
Under load, synchronize_net() can last between 200 usec and 5 ms.
KASAN seems to agree as well.
[
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 360.0,
"function_hash": "86425983147522921785799745019223187731"
},
"target": {
"file": "net/ipv6/mcast.c",
"function": "ipv6_mc_down"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a03ede2282ebbd181bd6f5c38cbfcb5765afcd04",
"signature_version": "v1",
"id": "CVE-2024-27390-3719537a"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 360.0,
"function_hash": "86425983147522921785799745019223187731"
},
"target": {
"file": "net/ipv6/mcast.c",
"function": "ipv6_mc_down"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9d159d6637ccce25f879d662a480541ef4ba3a50",
"signature_version": "v1",
"id": "CVE-2024-27390-810eb489"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"113630762064832964249334334260619515412",
"221237442598228597168795350702183806749",
"164336794624260315638018348000077498252",
"87495472713066199981880771696581102079"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv6/mcast.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9d159d6637ccce25f879d662a480541ef4ba3a50",
"signature_version": "v1",
"id": "CVE-2024-27390-81764f86"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"113630762064832964249334334260619515412",
"221237442598228597168795350702183806749",
"164336794624260315638018348000077498252",
"87495472713066199981880771696581102079"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv6/mcast.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a03ede2282ebbd181bd6f5c38cbfcb5765afcd04",
"signature_version": "v1",
"id": "CVE-2024-27390-b0384980"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 360.0,
"function_hash": "86425983147522921785799745019223187731"
},
"target": {
"file": "net/ipv6/mcast.c",
"function": "ipv6_mc_down"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5da9a218340a2bc804dc4327e5804392e24a0b88",
"signature_version": "v1",
"id": "CVE-2024-27390-e2b97272"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"113630762064832964249334334260619515412",
"221237442598228597168795350702183806749",
"164336794624260315638018348000077498252",
"87495472713066199981880771696581102079"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv6/mcast.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5da9a218340a2bc804dc4327e5804392e24a0b88",
"signature_version": "v1",
"id": "CVE-2024-27390-e8f4286b"
}
]