CVE-2024-50127
net: sched: fix use-after-free in taprio_change()
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Nov 5, 2024 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
a3d43c0d56f1b94e74963a2fbadfb70126d92213 < 2f868ce6013548a713c431c679ef73747a66fcf3 a3d43c0d56f1b94e74963a2fbadfb70126d92213 < 8a283a19026aaae8a773fd8061263cfa315b127f a3d43c0d56f1b94e74963a2fbadfb70126d92213 < 999612996df28d81f163dad530d7f8026e03aec6 a3d43c0d56f1b94e74963a2fbadfb70126d92213 < fe371f084073e8672a2d7d46b335c3c060d1e301 a3d43c0d56f1b94e74963a2fbadfb70126d92213 < 0d4c0d2844e4eac3aed647f948fd7e60eea56a61 a3d43c0d56f1b94e74963a2fbadfb70126d92213 < 2240f9376f20f8b6463232b4ca7292569217237f a3d43c0d56f1b94e74963a2fbadfb70126d92213 < f504465970aebb2467da548f7c1efbbf36d0f44b
Linux / Linux
5.2
References
git.kernel.org: https://git.kernel.org/stable/c/2f868ce6013548a713c431c679ef73747a66fcf3 git.kernel.org: https://git.kernel.org/stable/c/8a283a19026aaae8a773fd8061263cfa315b127f git.kernel.org: https://git.kernel.org/stable/c/999612996df28d81f163dad530d7f8026e03aec6 git.kernel.org: https://git.kernel.org/stable/c/fe371f084073e8672a2d7d46b335c3c060d1e301 git.kernel.org: https://git.kernel.org/stable/c/0d4c0d2844e4eac3aed647f948fd7e60eea56a61 git.kernel.org: https://git.kernel.org/stable/c/2240f9376f20f8b6463232b4ca7292569217237f git.kernel.org: https://git.kernel.org/stable/c/f504465970aebb2467da548f7c1efbbf36d0f44b lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html