In the Linux kernel, the following vulnerability has been resolved:
watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
When the cpu5wdt module is removing, the origin code uses del_timer() to
de-activate the timer. If the timer handler is running, del_timer() could
not stop it and will return directly. If the port region is released by
release_region() and then the timer handler cpu5wdt_trigger() calls outb()
to write into the region that is released, the use-after-free bug will
happen.
Change del_timer() to timer_shutdown_sync() in order that the timer handler
could be finished before the port region is released.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/573601521277119f2e2ba5f28ae6e87fc594f4d4 - Patch | |
References | () https://git.kernel.org/stable/c/9b1c063ffc075abf56f63e55d70b9778ff534314 - Patch | |
References | () https://git.kernel.org/stable/c/f19686d616500cd0d47b30cee82392b53f7f784a - Patch |
09 Sep 2024, 13:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Summary |
|
|
CWE | CWE-416 | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/573601521277119f2e2ba5f28ae6e87fc594f4d4 - Patch | |
References | () https://git.kernel.org/stable/c/9b1c063ffc075abf56f63e55d70b9778ff534314 - Patch | |
References | () https://git.kernel.org/stable/c/f19686d616500cd0d47b30cee82392b53f7f784a - Patch |
21 Jun 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-21 11:15
Updated : 2024-11-21 09:26
NVD link : CVE-2024-38630
Mitre link : CVE-2024-38630
CVE.ORG link : CVE-2024-38630
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free