CVE-2024-56654

CVE Details

Release Date:2024-12-27
Impact:Moderate What is this?

Description


In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating The usage of rcu_read_(un)lock while inside list_for_each_entry_rcu is not safe since for the most part entries fetched this way shall be treated as rcu_dereference: Note that the value returned by rcu_dereference() is valid only within the enclosing RCU read-side critical section [1]_. For example, the following is **not** legal:: rcu_read_lock(); p = rcu_dereference(head.next); rcu_read_unlock(); x = p->address; /0 /afs /auto-build /bin /BISOS /boot /build-isos /build_uploads /ca-build32_u01_output /debuginfo-rpms /dev /etc /home /import /ISOS /ksplice-archive /lib /lib64 /media /misc /mnt /net /olrm /opt /ovm_daily_output /proc /re /root /run /sbin /share /sqlnet.log /srv /swapfile /sys /tmp /uln_builds /usr /var /workspace /ws BUG!!! bak/ done/ modules/ src_missing/ rcu_read_lock(); y = p->data; /0 /afs /auto-build /bin /BISOS /boot /build-isos /build_uploads /ca-build32_u01_output /debuginfo-rpms /dev /etc /home /import /ISOS /ksplice-archive /lib /lib64 /media /misc /mnt /net /olrm /opt /ovm_daily_output /proc /re /root /run /sbin /share /sqlnet.log /srv /swapfile /sys /tmp /uln_builds /usr /var /workspace /ws BUG!!! bak/ done/ modules/ src_missing/ rcu_read_unlock();

See more information about CVE-2024-56654 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 5.5
Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Attack Vector: Local
Attack Complexity: Low
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 9 (kernel) ELSA-2025-69662025-05-16


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete