跳转到帖子

Oracle Linux: CVE-2024-39495: ELSA-2024-12610: Unbreakable Enterprise kernel security update (IMPORTANT) (Multiple Advisories)

recommended_posts

发布于
  • Members

Oracle Linux: CVE-2024-39495: ELSA-2024-12610: Unbreakable Enterprise kernel security update (IMPORTANT) (Multiple Advisories)

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
07/12/2024
Created
10/24/2024
Added
10/16/2024
Modified
01/23/2025

Description

In the Linux kernel, the following vulnerability has been resolved: greybus: Fix use-after-free bug in gb_interface_release due to race condition. In gb_interface_create, &intf->mode_switch_completion is bound with gb_interface_mode_switch_work. Then it will be started by gb_interface_request_mode_switch. Here is the relevant code. if (!queue_work(system_long_wq, &intf->mode_switch_work)) { ... } If we call gb_interface_release to make cleanup, there may be an unfinished work. This function will call kfree to free the object "intf". However, if gb_interface_mode_switch_work is scheduled to run after kfree, it may cause use-after-free error as gb_interface_mode_switch_work will use the object "intf". The possible execution flow that may lead to the issue is as follows: CPU0CPU1 | gb_interface_create | gb_interface_request_mode_switch gb_interface_release| kfree(intf) (free)| | gb_interface_mode_switch_work | mutex_lock(&intf->mutex) (use) Fix it by canceling the work before kfree.

Solution(s)

  • oracle-linux-upgrade-kernel-uek

References

  • https://attackerkb.com/topics/cve-2024-39495
  • CVE - 2024-39495
  • ELSA-2024-12610
  • ELSA-2024-12618
  • ELSA-2024-12612
  • 查看数 700
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…