CVE-2024-50051

In the Linux kernel, the following vulnerability has been resolved: spi: mpc52xx: Add cancel_work_sync before module remove If we remove the module which will call mpc52xx_spi_remove it will free 'ms' through spi_unregister_controller. while the work ms->work will be used. The sequence of operations that may lead to a UAF bug. Fix it by ensuring that the work is canceled before proceeding with the cleanup in mpc52xx_spi_remove.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*

History

03 Feb 2025, 15:17

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: mpc52xx: Agregar cancel_work_sync antes de eliminar el módulo Si eliminamos el módulo que llamará a mpc52xx_spi_remove, liberará 'ms' a través de spi_unregister_controller. mientras que se utilizará el trabajo ms->work. La secuencia de operaciones que puede provocar un error de UAF. Arréglelo asegurándose de que el trabajo se cancele antes de continuar con la desinfección en mpc52xx_spi_remove.
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/373d55a47dc662e5e30d12ad5d334312f757c1f1 - () https://git.kernel.org/stable/c/373d55a47dc662e5e30d12ad5d334312f757c1f1 - Patch
References () https://git.kernel.org/stable/c/90b72189de2cddacb26250579da0510b29a8b82b - () https://git.kernel.org/stable/c/90b72189de2cddacb26250579da0510b29a8b82b - Patch
References () https://git.kernel.org/stable/c/984836621aad98802d92c4a3047114cf518074c8 - () https://git.kernel.org/stable/c/984836621aad98802d92c4a3047114cf518074c8 - Patch
References () https://git.kernel.org/stable/c/cd5106c77d6d6828aa82449f01f4eb436d602a21 - () https://git.kernel.org/stable/c/cd5106c77d6d6828aa82449f01f4eb436d602a21 - Patch
References () https://git.kernel.org/stable/c/d0cde3911cf24e1bcdd4caa1d1b9ef57589db5a1 - () https://git.kernel.org/stable/c/d0cde3911cf24e1bcdd4caa1d1b9ef57589db5a1 - Patch
References () https://git.kernel.org/stable/c/e0c6ce8424095c2da32a063d3fc027494c689817 - () https://git.kernel.org/stable/c/e0c6ce8424095c2da32a063d3fc027494c689817 - Patch
References () https://git.kernel.org/stable/c/f65d85bc1ffd8a2c194bb2cd65e35ed3648ddd59 - () https://git.kernel.org/stable/c/f65d85bc1ffd8a2c194bb2cd65e35ed3648ddd59 - Patch
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

11 Jan 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-11 13:15

Updated : 2025-02-10 18:15


NVD link : CVE-2024-50051

Mitre link : CVE-2024-50051

CVE.ORG link : CVE-2024-50051


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free