In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: SCO: Fix UAF on sco_sock_timeout
conn->sk maybe have been unlinked/freed while waiting for sco_conn_lock
so this checks if the conn->sk is still valid by checking if it part of
sco_sk_list.
References
Configurations
Configuration 1 (hide)
|
History
08 Nov 2024, 20:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1bf4470a3939c678fb822073e9ea77a0560bc6bb - Patch | |
References | () https://git.kernel.org/stable/c/80b05fbfa998480fb3d5299d93eab946f51e9c36 - Patch | |
References | () https://git.kernel.org/stable/c/9ddda5d967e84796e7df1b54a55f36b4b9f21079 - Patch | |
References | () https://git.kernel.org/stable/c/d30803f6a972b5b9e26d1d43b583c7ec151de04b - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:5.4.148:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13.19:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.19.207:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.10.67:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.14.263:*:*:*:*:*:*:* |
|
CWE | CWE-416 | |
First Time |
Linux
Linux linux Kernel |
06 Nov 2024, 18:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-05 18:15
Updated : 2024-11-08 20:04
NVD link : CVE-2024-50125
Mitre link : CVE-2024-50125
CVE.ORG link : CVE-2024-50125
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free