CVE-2024-56561

In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Fix PCI domain ID release in pci_epc_destroy() pci_epc_destroy() invokes pci_bus_release_domain_nr() to release the PCI domain ID, but there are two issues: - 'epc->dev' is passed to pci_bus_release_domain_nr() which was already freed by device_unregister(), leading to a use-after-free issue. - Domain ID corresponds to the EPC device parent, so passing 'epc->dev' is also wrong. Fix these issues by passing 'epc->dev.parent' to pci_bus_release_domain_nr() and also do it before device_unregister(). [mani: reworded subject and description]
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Jan 2025, 15:12

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: endpoint: Fix PCI domain ID release in pci_epc_destroy() pci_epc_destroy() invoca pci_bus_release_domain_nr() para liberar el ID de dominio PCI, pero hay dos problemas: - 'epc->dev' se pasa a pci_bus_release_domain_nr() que ya fue liberado por device_unregister(), lo que genera un problema de use-after-free. - El ID de dominio corresponde al dispositivo EPC principal, por lo que pasar 'epc->dev' también es incorrecto. Solucione estos problemas pasando 'epc->dev.parent' a pci_bus_release_domain_nr() y también hágalo antes de device_unregister(). [mani: asunto y descripción reformulados]
References () https://git.kernel.org/stable/c/4acc902ed3743edd4ac2d3846604a99d17104359 - () https://git.kernel.org/stable/c/4acc902ed3743edd4ac2d3846604a99d17104359 - Patch
References () https://git.kernel.org/stable/c/c74a1df6c2a2df7dd45c3fc1a5edc29a075dcf22 - () https://git.kernel.org/stable/c/c74a1df6c2a2df7dd45c3fc1a5edc29a075dcf22 - Patch
First Time Linux linux Kernel
Linux
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

27 Dec 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 15:15

Updated : 2025-02-11 16:15


NVD link : CVE-2024-56561

Mitre link : CVE-2024-56561

CVE.ORG link : CVE-2024-56561


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free