CVE-2024-50127

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
05/11/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: sched: fix use-after-free in taprio_change()<br /> <br /> In &amp;#39;taprio_change()&amp;#39;, &amp;#39;admin&amp;#39; pointer may become dangling due to sched<br /> switch / removal caused by &amp;#39;advance_sched()&amp;#39;, and critical section<br /> protected by &amp;#39;q-&gt;current_entry_lock&amp;#39; is too small to prevent from such<br /> a scenario (which causes use-after-free detected by KASAN). Fix this<br /> by prefer &amp;#39;rcu_replace_pointer()&amp;#39; over &amp;#39;rcu_assign_pointer()&amp;#39; to update<br /> &amp;#39;admin&amp;#39; immediately before an attempt to schedule freeing.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.2 (including) 5.15.170 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.115 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.59 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.11.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*