Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: netrom: Fix data-races around sysctl_net_busy_read We need to protect the reader reading the sysctl value because the value can be changed concurrently.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.13, < 4.19.310 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0866afaff19d8460308b022345ed116a12b1d0e1Patch
- https://git.kernel.org/stable/c/16d71319e29d5825ab53f263b59fdd8dc2d60ad4Patch
- https://git.kernel.org/stable/c/34cab94f7473e7b09f5205d4583fb5096cb63b5bPatch
- https://git.kernel.org/stable/c/43464808669ba9d23996f0b6d875450191687cafPatch
- https://git.kernel.org/stable/c/bbf950a6e96a91cf8cf0c71117b94ed3fafc9dd3Patch
- https://git.kernel.org/stable/c/d380ce70058a4ccddc3e5f5c2063165dc07672c6Patch
- https://git.kernel.org/stable/c/d623fd5298d95b65d27ef5a618ebf39541074856Patch
- https://git.kernel.org/stable/c/f9055fa2b2931261d5f89948ee5bc315b6a22d4aPatch
- https://git.kernel.org/stable/c/0866afaff19d8460308b022345ed116a12b1d0e1Patch
- https://git.kernel.org/stable/c/16d71319e29d5825ab53f263b59fdd8dc2d60ad4Patch
- https://git.kernel.org/stable/c/34cab94f7473e7b09f5205d4583fb5096cb63b5bPatch
- https://git.kernel.org/stable/c/43464808669ba9d23996f0b6d875450191687cafPatch
- https://git.kernel.org/stable/c/bbf950a6e96a91cf8cf0c71117b94ed3fafc9dd3Patch
- https://git.kernel.org/stable/c/d380ce70058a4ccddc3e5f5c2063165dc07672c6Patch
- https://git.kernel.org/stable/c/d623fd5298d95b65d27ef5a618ebf39541074856Patch
FAQ
What is CVE-2024-27419?
CVE-2024-27419 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: netrom: Fix data-races around sysctl_net_busy_read We need to protect the reader reading the sysctl value because the value can be...
How severe is CVE-2024-27419?
CVE-2024-27419 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-27419?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux.