In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating
The usage of rcu_read_(un)lock while inside list_for_each_entry_rcu is
not safe since for the most part entries fetched this way shall be
treated as rcu_dereference:
Note that the value returned by rcu_dereference() is valid
only within the enclosing RCU read-side critical section [1]_.
For example, the following is **not** legal::
rcu_read_lock();
p = rcu_dereference(head.next);
rcu_read_unlock();
x = p->address; /* BUG!!! */
rcu_read_lock();
y = p->data; /* BUG!!! */
rcu_read_unlock();
References
Configurations
Configuration 1 (hide)
|
History
06 Jan 2025, 22:33
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/0108132d7d76d884e443d18b4f067cdf2811911b - Patch | |
References | () https://git.kernel.org/stable/c/581dd2dc168fe0ed2a7a5534a724f0d3751c93ae - Patch | |
References | () https://git.kernel.org/stable/c/f9ecc90b5d501b3a5a62d0685d5104f934bb0104 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
Summary |
|
27 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-27 15:15
Updated : 2025-01-06 22:33
NVD link : CVE-2024-56654
Mitre link : CVE-2024-56654
CVE.ORG link : CVE-2024-56654
JSON object : View
Products Affected
linux
- linux_kernel
CWE