In the Linux kernel, the following vulnerability has been...
Moderate severity
Unreviewed
Published
Jun 25, 2024
to the GitHub Advisory Database
•
Updated Sep 3, 2024
Description
Published by the National Vulnerability Database
Jun 25, 2024
Published to the GitHub Advisory Database
Jun 25, 2024
Last updated
Sep 3, 2024
In the Linux kernel, the following vulnerability has been resolved:
genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after()
irq_find_at_or_after() dereferences the interrupt descriptor which is
returned by mt_find() while neither holding sparse_irq_lock nor RCU read
lock, which means the descriptor can be freed between mt_find() and the
dereference:
The use-after-free is reported by KASAN:
Guard the access with a RCU read lock section.
References