CVE-2024-50260

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
09/11/2024
Last modified:
01/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sock_map: fix a NULL pointer dereference in sock_map_link_update_prog()<br /> <br /> The following race condition could trigger a NULL pointer dereference:<br /> <br /> sock_map_link_detach(): sock_map_link_update_prog():<br /> mutex_lock(&amp;sockmap_mutex);<br /> ...<br /> sockmap_link-&gt;map = NULL;<br /> mutex_unlock(&amp;sockmap_mutex);<br /> mutex_lock(&amp;sockmap_mutex);<br /> ...<br /> sock_map_prog_link_lookup(sockmap_link-&gt;map);<br /> mutex_unlock(&amp;sockmap_mutex);<br /> <br /> <br /> Fix it by adding a NULL pointer check. In this specific case, it makes<br /> no sense to update a link which is being released.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.10 (including) 6.11.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*