Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2024-38630
HistoryJun 21, 2024 - 11:15 a.m.

CVE-2024-38630

2024-06-2111:15:11
Debian Security Bug Tracker
security-tracker.debian.org
1
linux kernel
vulnerability
resolved

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.6%

In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer handler is running, del_timer() could not stop it and will return directly. If the port region is released by release_region() and then the timer handler cpu5wdt_trigger() calls outb() to write into the region that is released, the use-after-free bug will happen. Change del_timer() to timer_shutdown_sync() in order that the timer handler could be finished before the port region is released.

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.6%

Related for DEBIANCVE:CVE-2024-38630