CVE-2024-40920

In the Linux kernel, the following vulnerability has been resolved: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state I converted br_mst_set_state to RCU to avoid a vlan use-after-free but forgot to change the vlan group dereference helper. Switch to vlan group RCU deref helper to fix the suspicious rcu usage warning.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*

History

17 Sep 2025, 15:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/406bfc04b01ee47e4c626f77ecc7d9f85135b166 - () https://git.kernel.org/stable/c/406bfc04b01ee47e4c626f77ecc7d9f85135b166 - Patch
References () https://git.kernel.org/stable/c/546ceb1dfdac866648ec959cbc71d9525bd73462 - () https://git.kernel.org/stable/c/546ceb1dfdac866648ec959cbc71d9525bd73462 - Patch
References () https://git.kernel.org/stable/c/7caefa2771722e65496d85b62e1dc4442b7d1345 - () https://git.kernel.org/stable/c/7caefa2771722e65496d85b62e1dc4442b7d1345 - Patch
References () https://git.kernel.org/stable/c/caaa2129784a04dcade0ea92c12e6ff90bbd23d8 - () https://git.kernel.org/stable/c/caaa2129784a04dcade0ea92c12e6ff90bbd23d8 - Patch
CWE CWE-416

21 Nov 2024, 09:31

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: net: bridge: mst: corrige el uso sospechoso de rcu en br_mst_set_state Convertí br_mst_set_state a RCU para evitar un use-after-free de VLAN, pero olvidé cambiar el asistente de desreferencia del grupo VLAN. Cambie al asistente deref de RCU del grupo vlan para corregir la advertencia de uso sospechoso de rcu.
References () https://git.kernel.org/stable/c/406bfc04b01ee47e4c626f77ecc7d9f85135b166 - () https://git.kernel.org/stable/c/406bfc04b01ee47e4c626f77ecc7d9f85135b166 -
References () https://git.kernel.org/stable/c/546ceb1dfdac866648ec959cbc71d9525bd73462 - () https://git.kernel.org/stable/c/546ceb1dfdac866648ec959cbc71d9525bd73462 -
References () https://git.kernel.org/stable/c/7caefa2771722e65496d85b62e1dc4442b7d1345 - () https://git.kernel.org/stable/c/7caefa2771722e65496d85b62e1dc4442b7d1345 -
References () https://git.kernel.org/stable/c/caaa2129784a04dcade0ea92c12e6ff90bbd23d8 - () https://git.kernel.org/stable/c/caaa2129784a04dcade0ea92c12e6ff90bbd23d8 -

12 Jul 2024, 16:34

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-09-17 15:40


NVD link : CVE-2024-40920

Mitre link : CVE-2024-40920

CVE.ORG link : CVE-2024-40920


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free