First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: mac802154: Fix potential RCU dereference issue in mac802154_scan_worker In the `mac802154_scan_worker` function, the `scan_req->type` field was accessed after the RCU read-side critical section was unlocked. According to RCU usage rules, this is illegal and can lead to unpredictable behavior, such as accessing memory that has been updated or causing use-after-free issues. This possible bug was identified using a static analysis tool developed by myself, specifically designed to detect RCU-related issues. To address this, the `scan_req->type` value is now stored in a local variable `scan_req_type` while still within the RCU read-side critical section. The `scan_req_type` is then used after the RCU lock is released, ensuring that the type value is safely accessed without violating RCU rules.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.5<6.6.55 | |
Linux Kernel | >=6.7<6.10.14 | |
Linux Kernel | >=6.11<6.11.3 | |
Linux Kernel | =6.12-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-50005 is high due to potential RCU dereference issues in the Linux kernel.
To fix CVE-2024-50005, update to the latest version of the Linux kernel that addresses this vulnerability.
CVE-2024-50005 affects Linux kernel versions between 6.5 to 6.6.55, 6.7 to 6.10.14, and 6.11 to 6.11.3, as well as version 6.12-rc1.
CVE-2024-50005 specifically involves the mac802154 component within the Linux kernel.
The nature of the vulnerability in CVE-2024-50005 involves accessing a field after leaving an RCU read-side critical section, leading to potential dereference issues.