CVE-2024-27390

Source
https://cve.org/CVERecord?id=CVE-2024-27390
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27390.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-27390
Downstream
Published
2024-05-01T13:05:12.775Z
Modified
2026-03-14T12:27:46.262233Z
Summary
ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down()
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: remove one synchronizenet() barrier in ipv6mc_down()

As discussed in the past (commit 2d3916f31891 ("ipv6: fix skb drops in igmp6eventquery() and igmp6eventreport()")) I think the synchronizenet() call in ipv6mc_down() is not needed.

Under load, synchronize_net() can last between 200 usec and 5 ms.

KASAN seems to agree as well.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27390.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f185de28d9ae6c978135993769352e523ee8df06
Fixed
9d159d6637ccce25f879d662a480541ef4ba3a50
Fixed
a03ede2282ebbd181bd6f5c38cbfcb5765afcd04
Fixed
26d4bac55750d535f1f0b8790dc26daf6089e373
Fixed
7eb06ee5921189812e6b4bfe7b0f1e878be16df7
Fixed
5da9a218340a2bc804dc4327e5804392e24a0b88
Fixed
17ef8efc00b34918b966388b2af0993811895a8c

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27390.json"