CVE-2024-38630
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
21/06/2024
Last modified:
09/09/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger<br />
<br />
When the cpu5wdt module is removing, the origin code uses del_timer() to<br />
de-activate the timer. If the timer handler is running, del_timer() could<br />
not stop it and will return directly. If the port region is released by<br />
release_region() and then the timer handler cpu5wdt_trigger() calls outb()<br />
to write into the region that is released, the use-after-free bug will<br />
happen.<br />
<br />
Change del_timer() to timer_shutdown_sync() in order that the timer handler<br />
could be finished before the port region is released.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.8 (including) | 6.6.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



