cve-2024-50005
Vulnerability from cvelistv5
Published
2024-10-21 18:53
Modified
2024-12-19 09:31
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: mac802154: Fix potential RCU dereference issue in mac802154_scan_worker In the `mac802154_scan_worker` function, the `scan_req->type` field was accessed after the RCU read-side critical section was unlocked. According to RCU usage rules, this is illegal and can lead to unpredictable behavior, such as accessing memory that has been updated or causing use-after-free issues. This possible bug was identified using a static analysis tool developed by myself, specifically designed to detect RCU-related issues. To address this, the `scan_req->type` value is now stored in a local variable `scan_req_type` while still within the RCU read-side critical section. The `scan_req_type` is then used after the RCU lock is released, ensuring that the type value is safely accessed without violating RCU rules.
Impacted products
Vendor Product Version
Linux Linux Version: e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8
Version: e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8
Version: e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8
Version: e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8
Create a notification for this product.
   Linux Linux Version: 6.5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-50005",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-22T13:29:26.338058Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-22T13:38:40.499Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "net/mac802154/scan.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "e676e4ea76bbe7f1156d8c326b9b6753849481c2",
                     status: "affected",
                     version: "e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8",
                     versionType: "git",
                  },
                  {
                     lessThan: "540138377b22f601f06f55ebfa3ca171dcab471a",
                     status: "affected",
                     version: "e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8",
                     versionType: "git",
                  },
                  {
                     lessThan: "d18f669461811dfe2915d5554ab2a9834f810013",
                     status: "affected",
                     version: "e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8",
                     versionType: "git",
                  },
                  {
                     lessThan: "bff1709b3980bd7f80be6786f64cc9a9ee9e56da",
                     status: "affected",
                     version: "e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "net/mac802154/scan.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "6.5",
                  },
                  {
                     lessThan: "6.5",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.55",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.10.*",
                     status: "unaffected",
                     version: "6.10.14",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.11.*",
                     status: "unaffected",
                     version: "6.11.3",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.12",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nmac802154: Fix potential RCU dereference issue in mac802154_scan_worker\n\nIn the `mac802154_scan_worker` function, the `scan_req->type` field was\naccessed after the RCU read-side critical section was unlocked. According\nto RCU usage rules, this is illegal and can lead to unpredictable\nbehavior, such as accessing memory that has been updated or causing\nuse-after-free issues.\n\nThis possible bug was identified using a static analysis tool developed\nby myself, specifically designed to detect RCU-related issues.\n\nTo address this, the `scan_req->type` value is now stored in a local\nvariable `scan_req_type` while still within the RCU read-side critical\nsection. The `scan_req_type` is then used after the RCU lock is released,\nensuring that the type value is safely accessed without violating RCU\nrules.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T09:31:07.474Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/e676e4ea76bbe7f1156d8c326b9b6753849481c2",
            },
            {
               url: "https://git.kernel.org/stable/c/540138377b22f601f06f55ebfa3ca171dcab471a",
            },
            {
               url: "https://git.kernel.org/stable/c/d18f669461811dfe2915d5554ab2a9834f810013",
            },
            {
               url: "https://git.kernel.org/stable/c/bff1709b3980bd7f80be6786f64cc9a9ee9e56da",
            },
         ],
         title: "mac802154: Fix potential RCU dereference issue in mac802154_scan_worker",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-50005",
      datePublished: "2024-10-21T18:53:59.259Z",
      dateReserved: "2024-10-21T12:17:06.059Z",
      dateUpdated: "2024-12-19T09:31:07.474Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-50005\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T19:15:04.143\",\"lastModified\":\"2024-11-07T19:27:01.613\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmac802154: Fix potential RCU dereference issue in mac802154_scan_worker\\n\\nIn the `mac802154_scan_worker` function, the `scan_req->type` field was\\naccessed after the RCU read-side critical section was unlocked. According\\nto RCU usage rules, this is illegal and can lead to unpredictable\\nbehavior, such as accessing memory that has been updated or causing\\nuse-after-free issues.\\n\\nThis possible bug was identified using a static analysis tool developed\\nby myself, specifically designed to detect RCU-related issues.\\n\\nTo address this, the `scan_req->type` value is now stored in a local\\nvariable `scan_req_type` while still within the RCU read-side critical\\nsection. The `scan_req_type` is then used after the RCU lock is released,\\nensuring that the type value is safely accessed without violating RCU\\nrules.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mac802154: Se soluciona un posible problema de desreferencia de RCU en mac802154_scan_worker En la función `mac802154_scan_worker`, se accedió al campo `scan_req->type` después de que se desbloqueara la sección crítica del lado de lectura de RCU. Según las reglas de uso de RCU, esto es ilegal y puede provocar un comportamiento impredecible, como acceder a la memoria que se ha actualizado o causar problemas de use after free. Este posible error se identificó utilizando una herramienta de análisis estático desarrollada por mí, diseñada específicamente para detectar problemas relacionados con RCU. Para solucionar esto, el valor `scan_req->type` ahora se almacena en una variable local `scan_req_type` mientras aún está dentro de la sección crítica del lado de lectura de RCU. Luego, `scan_req_type` se usa después de que se libera el bloqueo de RCU, lo que garantiza que se acceda al valor de tipo de manera segura sin violar las reglas de RCU.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5\",\"versionEndExcluding\":\"6.6.55\",\"matchCriteriaId\":\"D48A8C35-F8B9-4BFE-AC95-D7F90303D311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.14\",\"matchCriteriaId\":\"4C16BCE0-FFA0-4599-BE0A-1FD65101C021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.3\",\"matchCriteriaId\":\"54D9C704-D679-41A7-9C40-10A6B1E7FFE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F361E1D-580F-4A2D-A509-7615F73167A1\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/540138377b22f601f06f55ebfa3ca171dcab471a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/bff1709b3980bd7f80be6786f64cc9a9ee9e56da\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d18f669461811dfe2915d5554ab2a9834f810013\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e676e4ea76bbe7f1156d8c326b9b6753849481c2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-50005\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-22T13:29:26.338058Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-22T13:29:29.412Z\"}}], \"cna\": {\"title\": \"mac802154: Fix potential RCU dereference issue in mac802154_scan_worker\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8\", \"lessThan\": \"e676e4ea76bbe7f1156d8c326b9b6753849481c2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8\", \"lessThan\": \"540138377b22f601f06f55ebfa3ca171dcab471a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8\", \"lessThan\": \"d18f669461811dfe2915d5554ab2a9834f810013\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8\", \"lessThan\": \"bff1709b3980bd7f80be6786f64cc9a9ee9e56da\", \"versionType\": \"git\"}], \"programFiles\": [\"net/mac802154/scan.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.5\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.5\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.6.55\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.14\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/mac802154/scan.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e676e4ea76bbe7f1156d8c326b9b6753849481c2\"}, {\"url\": \"https://git.kernel.org/stable/c/540138377b22f601f06f55ebfa3ca171dcab471a\"}, {\"url\": \"https://git.kernel.org/stable/c/d18f669461811dfe2915d5554ab2a9834f810013\"}, {\"url\": \"https://git.kernel.org/stable/c/bff1709b3980bd7f80be6786f64cc9a9ee9e56da\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmac802154: Fix potential RCU dereference issue in mac802154_scan_worker\\n\\nIn the `mac802154_scan_worker` function, the `scan_req->type` field was\\naccessed after the RCU read-side critical section was unlocked. According\\nto RCU usage rules, this is illegal and can lead to unpredictable\\nbehavior, such as accessing memory that has been updated or causing\\nuse-after-free issues.\\n\\nThis possible bug was identified using a static analysis tool developed\\nby myself, specifically designed to detect RCU-related issues.\\n\\nTo address this, the `scan_req->type` value is now stored in a local\\nvariable `scan_req_type` while still within the RCU read-side critical\\nsection. The `scan_req_type` is then used after the RCU lock is released,\\nensuring that the type value is safely accessed without violating RCU\\nrules.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:31:07.474Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-50005\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:31:07.474Z\", \"dateReserved\": \"2024-10-21T12:17:06.059Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T18:53:59.259Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.