First published: Tue Nov 05 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.2<5.15.170 | |
Linux Kernel | >=5.16<6.1.115 | |
Linux Kernel | >=6.2<6.6.59 | |
Linux Kernel | >=6.7<6.11.6 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50127 has been classified with a high severity due to the use-after-free vulnerability in the Linux kernel.
To fix CVE-2024-50127, update your Linux kernel to a version that has patched the vulnerability, specifically versions beyond those specified in the affected software list.
CVE-2024-50127 affects multiple versions of the Linux kernel ranging from 5.2 to up to pre-release versions of 6.12 as specified in the vulnerability details.
CVE-2024-50127 can lead to potential remote exploitation, system crashes, or execution of arbitrary code due to the use-after-free condition.
Currently, there are no recommended workarounds for CVE-2024-50127; upgrading to a patched kernel version is the advised course of action.