In the Linux kernel, the following vulnerability has been resolved:
watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
When the cpu5wdt module is removing, the origin code uses del_timer() to
de-activate the timer. If the timer handler is running, del_timer() could
not stop it and will return directly. If the port region is released by
release_region() and then the timer handler cpu5wdt_trigger() calls outb()
to write into the region that is released, the use-after-free bug will
happen.
Change del_timer() to timer_shutdown_sync() in order that the timer handler
could be finished before the port region is released.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-06-21 11:15
Updated : 2024-11-21 09:26
NVD link : CVE-2024-38630
Mitre link : CVE-2024-38630
CVE.ORG link : CVE-2024-38630
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free