Use-After-Free Vulnerability in Linux Kernel's MPC52xx SPI Module
CVE-2024-50051
7.8HIGH
Summary
A use-after-free vulnerability exists in the Linux kernel's MPC52xx SPI module. When the module is removed, it can release resources inappropriately while a related work item is still active. Specifically, if the removal sequence occurs without canceling the active work, it can lead to a scenario where the freed resources are accessed, resulting in instability or potential security risks. The vulnerability has been addressed by ensuring that the work is properly canceled before the cleanup processes are executed in the module's removal function.
Affected Version(s)
Linux ca632f556697d45d67ed5cada7cedf3ddfe0db4b
Linux ca632f556697d45d67ed5cada7cedf3ddfe0db4b
Linux ca632f556697d45d67ed5cada7cedf3ddfe0db4b
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved