First published: Sun May 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ax25: fix use-after-free bugs caused by ax25_ds_del_timer When the ax25 device is detaching, the ax25_dev_device_down() calls ax25_ds_del_timer() to cleanup the slave_timer. When the timer handler is running, the ax25_ds_del_timer() that calls del_timer() in it will return directly. As a result, the use-after-free bugs could happen, one of the scenarios is shown below: (Thread 1) | (Thread 2) | ax25_ds_timeout() ax25_dev_device_down() | ax25_ds_del_timer() | del_timer() | ax25_dev_put() //FREE | | ax25_dev-> //USE In order to mitigate bugs, when the device is detaching, use timer_shutdown_sync() to stop the timer.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=2.6.12<6.6.26 | |
Linux Linux kernel | >=6.7<6.8.5 | |
Linux Linux kernel | =6.9-rc1 | |
Linux Linux kernel | =6.9-rc2 | |
debian/linux | <=5.10.223-1<=5.10.226-1<=6.1.115-1<=6.1.119-1 | 6.12.6-1 6.12.8-1 |
Ensure that /etc/modprobe.d/blacklist-rare-network.conf contains following lines: # ax25 alias net-pf-3 off
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.