
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a use-after-free vulnerability was discovered in the TIPC (Transparent Inter-Process Communication) subsystem, specifically in the tipcnamedreinit function. The vulnerability was introduced by commit d966ddcc3821 which attempted to fix a deadlock when flushing scheduled work. The issue occurs because the cancelworksync() function only ensures the tipcnetfinalize_work() is completed before the TIPC namespace is destroyed, but doesn't guarantee it was the last queued work (Kernel Commit).
The vulnerability manifests as a use-after-free condition in the tipcnamedreinit function at net/tipc/name_distr.c:413. The issue arises because a destroyed instance may be accessed in work that gets queued later. The bug was discovered by the Syzkaller kernel fuzzer, which detected a read of size 8 at an invalid memory address by a kernel worker thread (Kernel Commit).
This vulnerability could lead to use-after-free conditions in the kernel's TIPC subsystem, potentially resulting in system crashes, memory corruption, or other undefined behavior. The issue affects the kernel's networking stack, specifically the TIPC protocol implementation (Kernel Commit).
The issue was fixed by reordering the calling of cancelworksync() to ensure the tipcnetfinalizework() is the last queued work and must be completed before proceeding. The fix involves moving the tipcnetstop() call before cancelwork_sync() (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."