CVE-2024-50005

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
21/10/2024
Last modified:
07/11/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mac802154: Fix potential RCU dereference issue in mac802154_scan_worker<br /> <br /> In the `mac802154_scan_worker` function, the `scan_req-&gt;type` field was<br /> accessed after the RCU read-side critical section was unlocked. According<br /> to RCU usage rules, this is illegal and can lead to unpredictable<br /> behavior, such as accessing memory that has been updated or causing<br /> use-after-free issues.<br /> <br /> This possible bug was identified using a static analysis tool developed<br /> by myself, specifically designed to detect RCU-related issues.<br /> <br /> To address this, the `scan_req-&gt;type` value is now stored in a local<br /> variable `scan_req_type` while still within the RCU read-side critical<br /> section. The `scan_req_type` is then used after the RCU lock is released,<br /> ensuring that the type value is safely accessed without violating RCU<br /> rules.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.5 (including) 6.6.55 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.14 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.11 (including) 6.11.3 (excluding)
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*