Use-After-Free Vulnerability in Linux Kernel's MPC52xx SPI Module
CVE-2024-50051

7.8HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
11 January 2025

Summary

A use-after-free vulnerability exists in the Linux kernel's MPC52xx SPI module. When the module is removed, it can release resources inappropriately while a related work item is still active. Specifically, if the removal sequence occurs without canceling the active work, it can lead to a scenario where the freed resources are accessed, resulting in instability or potential security risks. The vulnerability has been addressed by ensuring that the work is properly canceled before the cleanup processes are executed in the module's removal function.

Affected Version(s)

Linux ca632f556697d45d67ed5cada7cedf3ddfe0db4b

Linux ca632f556697d45d67ed5cada7cedf3ddfe0db4b

Linux ca632f556697d45d67ed5cada7cedf3ddfe0db4b

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.