CVE-2024-41062

In the Linux kernel, the following vulnerability has been resolved: bluetooth/l2cap: sync sock recv cb and release The problem occurs between the system call to close the sock and hci_rx_work, where the former releases the sock and the latter accesses it without lock protection. CPU0 CPU1 ---- ---- sock_close hci_rx_work l2cap_sock_release hci_acldata_packet l2cap_sock_kill l2cap_recv_frame sk_free l2cap_conless_channel l2cap_sock_recv_cb If hci_rx_work processes the data that needs to be received before the sock is closed, then everything is normal; Otherwise, the work thread may access the released sock when receiving data. Add a chan mutex in the rx callback of the sock to achieve synchronization between the sock release and recv cb. Sock is dead, so set chan data to NULL, avoid others use invalid sock pointer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*

History

09 Oct 2025, 18:06

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/3b732449b78183d17178db40be3a4401cf3cd629 - () https://git.kernel.org/stable/c/3b732449b78183d17178db40be3a4401cf3cd629 - Patch
References () https://git.kernel.org/stable/c/605572e64cd9cebb05ed609d96cff05b50d18cdf - () https://git.kernel.org/stable/c/605572e64cd9cebb05ed609d96cff05b50d18cdf - Patch
References () https://git.kernel.org/stable/c/89e856e124f9ae548572c56b1b70c2255705f8fe - () https://git.kernel.org/stable/c/89e856e124f9ae548572c56b1b70c2255705f8fe - Patch
References () https://git.kernel.org/stable/c/b803f30ea23e0968b6c8285c42adf0d862ab2bf6 - () https://git.kernel.org/stable/c/b803f30ea23e0968b6c8285c42adf0d862ab2bf6 - Patch
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel

21 Nov 2024, 09:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: bluetooth/l2cap: sync sock recv cb and release El problema ocurre entre la llamada al sistema para cerrar el calcetín y hci_rx_work, donde el primero libera el calcetín y el segundo accede a él sin protección de bloqueo. . CPU0 CPU1 ---- ---- sock_close hci_rx_work l2cap_sock_release hci_acldata_packet l2cap_sock_kill l2cap_recv_frame sk_free l2cap_conless_channel l2cap_sock_recv_cb Si hci_rx_work procesa los datos que deben recibirse antes de cerrar el sock, entonces todo es normal; De lo contrario, el hilo de trabajo puede acceder al sock liberado al recibir datos. Agregue un mutex chan en la devolución de llamada rx del sock para lograr la sincronización entre la liberación del sock y recv cb. Sock está muerto, así que configure los datos de chan en NULL, evite que otros usen un puntero de sock no válido.
References () https://git.kernel.org/stable/c/3b732449b78183d17178db40be3a4401cf3cd629 - () https://git.kernel.org/stable/c/3b732449b78183d17178db40be3a4401cf3cd629 -
References () https://git.kernel.org/stable/c/605572e64cd9cebb05ed609d96cff05b50d18cdf - () https://git.kernel.org/stable/c/605572e64cd9cebb05ed609d96cff05b50d18cdf -
References () https://git.kernel.org/stable/c/89e856e124f9ae548572c56b1b70c2255705f8fe - () https://git.kernel.org/stable/c/89e856e124f9ae548572c56b1b70c2255705f8fe -
References () https://git.kernel.org/stable/c/b803f30ea23e0968b6c8285c42adf0d862ab2bf6 - () https://git.kernel.org/stable/c/b803f30ea23e0968b6c8285c42adf0d862ab2bf6 -

29 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 15:15

Updated : 2025-10-09 18:06


NVD link : CVE-2024-41062

Mitre link : CVE-2024-41062

CVE.ORG link : CVE-2024-41062


JSON object : View

Products Affected

linux

  • linux_kernel