![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-36979 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
net: bridge: mst: fix vlan use-after-free syzbot reported a suspicious
rcu usage[1] in bridge's mst code. While fixing it I noticed that
nothing prevents a vlan to be freed while walking the list from the
same path (br forward delay timer). Fix the rcu usage and also make
sure we are not accessing freed memory by making br_mst_vlan_set_state
use rcu read lock. [1] WARNING: suspicious RCU usage
6.9.0-rc6-syzkaller #0 Not tainted -----------------------------
net/bridge/br_private.h:1599 suspicious rcu_dereference_protected()
usage! ... stack backtrace: CPU: 1 PID: 8017 Comm: syz-executor.1 Not
tainted 6.9.0-rc6-syzkaller #0 Hardware name: Google Google Compute
Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-36979 https://git.kernel.org/stable/c/3a7c1661ae1383364cd6092d851f5e5da64d476b https://git.kernel.org/stable/c/3a7c1661ae1383364cd6092d851f5e5da64d476b https://git.kernel.org/stable/c/4488617e5e995a09abe4d81add5fb165674edb59 https://git.kernel.org/stable/c/4488617e5e995a09abe4d81add5fb165674edb59 https://git.kernel.org/stable/c/8ca9a750fc711911ef616ceb627d07357b04545e https://git.kernel.org/stable/c/8ca9a750fc711911ef616ceb627d07357b04545e https://git.kernel.org/stable/c/a2b01e65d9ba8af2bb086d3b7288ca53a07249ac https://git.kernel.org/stable/c/a2b01e65d9ba8af2bb086d3b7288ca53a07249ac https://git.kernel.org/stable/c/e43dd2b1ec746e105b7db5f9ad6ef14685a615a4 https://git.kernel.org/stable/c/e43dd2b1ec746e105b7db5f9ad6ef14685a615a4 |