cve-2024-50005
Vulnerability from cvelistv5
Published
2024-10-21 18:53
Modified
2024-12-19 09:31
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: mac802154: Fix potential RCU dereference issue in mac802154_scan_worker In the `mac802154_scan_worker` function, the `scan_req->type` field was accessed after the RCU read-side critical section was unlocked. According to RCU usage rules, this is illegal and can lead to unpredictable behavior, such as accessing memory that has been updated or causing use-after-free issues. This possible bug was identified using a static analysis tool developed by myself, specifically designed to detect RCU-related issues. To address this, the `scan_req->type` value is now stored in a local variable `scan_req_type` while still within the RCU read-side critical section. The `scan_req_type` is then used after the RCU lock is released, ensuring that the type value is safely accessed without violating RCU rules.
Impacted products
Vendor Product Version
Linux Linux Version: e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8
Version: e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8
Version: e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8
Version: e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8
Create a notification for this product.
   Linux Linux Version: 6.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-50005",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T13:29:26.338058Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T13:38:40.499Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/mac802154/scan.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "e676e4ea76bbe7f1156d8c326b9b6753849481c2",
              "status": "affected",
              "version": "e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8",
              "versionType": "git"
            },
            {
              "lessThan": "540138377b22f601f06f55ebfa3ca171dcab471a",
              "status": "affected",
              "version": "e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8",
              "versionType": "git"
            },
            {
              "lessThan": "d18f669461811dfe2915d5554ab2a9834f810013",
              "status": "affected",
              "version": "e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8",
              "versionType": "git"
            },
            {
              "lessThan": "bff1709b3980bd7f80be6786f64cc9a9ee9e56da",
              "status": "affected",
              "version": "e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/mac802154/scan.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.5"
            },
            {
              "lessThan": "6.5",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.55",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.14",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.12",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac802154: Fix potential RCU dereference issue in mac802154_scan_worker\n\nIn the `mac802154_scan_worker` function, the `scan_req-\u003etype` field was\naccessed after the RCU read-side critical section was unlocked. According\nto RCU usage rules, this is illegal and can lead to unpredictable\nbehavior, such as accessing memory that has been updated or causing\nuse-after-free issues.\n\nThis possible bug was identified using a static analysis tool developed\nby myself, specifically designed to detect RCU-related issues.\n\nTo address this, the `scan_req-\u003etype` value is now stored in a local\nvariable `scan_req_type` while still within the RCU read-side critical\nsection. The `scan_req_type` is then used after the RCU lock is released,\nensuring that the type value is safely accessed without violating RCU\nrules."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:31:07.474Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/e676e4ea76bbe7f1156d8c326b9b6753849481c2"
        },
        {
          "url": "https://git.kernel.org/stable/c/540138377b22f601f06f55ebfa3ca171dcab471a"
        },
        {
          "url": "https://git.kernel.org/stable/c/d18f669461811dfe2915d5554ab2a9834f810013"
        },
        {
          "url": "https://git.kernel.org/stable/c/bff1709b3980bd7f80be6786f64cc9a9ee9e56da"
        }
      ],
      "title": "mac802154: Fix potential RCU dereference issue in mac802154_scan_worker",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-50005",
    "datePublished": "2024-10-21T18:53:59.259Z",
    "dateReserved": "2024-10-21T12:17:06.059Z",
    "dateUpdated": "2024-12-19T09:31:07.474Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-50005\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T19:15:04.143\",\"lastModified\":\"2024-11-07T19:27:01.613\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmac802154: Fix potential RCU dereference issue in mac802154_scan_worker\\n\\nIn the `mac802154_scan_worker` function, the `scan_req-\u003etype` field was\\naccessed after the RCU read-side critical section was unlocked. According\\nto RCU usage rules, this is illegal and can lead to unpredictable\\nbehavior, such as accessing memory that has been updated or causing\\nuse-after-free issues.\\n\\nThis possible bug was identified using a static analysis tool developed\\nby myself, specifically designed to detect RCU-related issues.\\n\\nTo address this, the `scan_req-\u003etype` value is now stored in a local\\nvariable `scan_req_type` while still within the RCU read-side critical\\nsection. The `scan_req_type` is then used after the RCU lock is released,\\nensuring that the type value is safely accessed without violating RCU\\nrules.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mac802154: Se soluciona un posible problema de desreferencia de RCU en mac802154_scan_worker En la funci\u00f3n `mac802154_scan_worker`, se accedi\u00f3 al campo `scan_req-\u0026gt;type` despu\u00e9s de que se desbloqueara la secci\u00f3n cr\u00edtica del lado de lectura de RCU. Seg\u00fan las reglas de uso de RCU, esto es ilegal y puede provocar un comportamiento impredecible, como acceder a la memoria que se ha actualizado o causar problemas de use after free. Este posible error se identific\u00f3 utilizando una herramienta de an\u00e1lisis est\u00e1tico desarrollada por m\u00ed, dise\u00f1ada espec\u00edficamente para detectar problemas relacionados con RCU. Para solucionar esto, el valor `scan_req-\u0026gt;type` ahora se almacena en una variable local `scan_req_type` mientras a\u00fan est\u00e1 dentro de la secci\u00f3n cr\u00edtica del lado de lectura de RCU. Luego, `scan_req_type` se usa despu\u00e9s de que se libera el bloqueo de RCU, lo que garantiza que se acceda al valor de tipo de manera segura sin violar las reglas de RCU.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5\",\"versionEndExcluding\":\"6.6.55\",\"matchCriteriaId\":\"D48A8C35-F8B9-4BFE-AC95-D7F90303D311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.14\",\"matchCriteriaId\":\"4C16BCE0-FFA0-4599-BE0A-1FD65101C021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.3\",\"matchCriteriaId\":\"54D9C704-D679-41A7-9C40-10A6B1E7FFE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F361E1D-580F-4A2D-A509-7615F73167A1\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/540138377b22f601f06f55ebfa3ca171dcab471a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/bff1709b3980bd7f80be6786f64cc9a9ee9e56da\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d18f669461811dfe2915d5554ab2a9834f810013\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e676e4ea76bbe7f1156d8c326b9b6753849481c2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-50005\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-22T13:29:26.338058Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-22T13:29:29.412Z\"}}], \"cna\": {\"title\": \"mac802154: Fix potential RCU dereference issue in mac802154_scan_worker\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8\", \"lessThan\": \"e676e4ea76bbe7f1156d8c326b9b6753849481c2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8\", \"lessThan\": \"540138377b22f601f06f55ebfa3ca171dcab471a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8\", \"lessThan\": \"d18f669461811dfe2915d5554ab2a9834f810013\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8\", \"lessThan\": \"bff1709b3980bd7f80be6786f64cc9a9ee9e56da\", \"versionType\": \"git\"}], \"programFiles\": [\"net/mac802154/scan.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.5\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.5\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.6.55\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.14\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/mac802154/scan.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e676e4ea76bbe7f1156d8c326b9b6753849481c2\"}, {\"url\": \"https://git.kernel.org/stable/c/540138377b22f601f06f55ebfa3ca171dcab471a\"}, {\"url\": \"https://git.kernel.org/stable/c/d18f669461811dfe2915d5554ab2a9834f810013\"}, {\"url\": \"https://git.kernel.org/stable/c/bff1709b3980bd7f80be6786f64cc9a9ee9e56da\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmac802154: Fix potential RCU dereference issue in mac802154_scan_worker\\n\\nIn the `mac802154_scan_worker` function, the `scan_req-\u003etype` field was\\naccessed after the RCU read-side critical section was unlocked. According\\nto RCU usage rules, this is illegal and can lead to unpredictable\\nbehavior, such as accessing memory that has been updated or causing\\nuse-after-free issues.\\n\\nThis possible bug was identified using a static analysis tool developed\\nby myself, specifically designed to detect RCU-related issues.\\n\\nTo address this, the `scan_req-\u003etype` value is now stored in a local\\nvariable `scan_req_type` while still within the RCU read-side critical\\nsection. The `scan_req_type` is then used after the RCU lock is released,\\nensuring that the type value is safely accessed without violating RCU\\nrules.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:31:07.474Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-50005\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:31:07.474Z\", \"dateReserved\": \"2024-10-21T12:17:06.059Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T18:53:59.259Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.