
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-50126 is a use-after-free vulnerability discovered in the taprio_dump() function of the Linux kernel. The vulnerability was identified on a KASAN-enabled arm64 system, though it was never observed on x86 systems. The issue affects Linux kernel versions from 6.1 up to (excluding) 6.6.59 and from 6.7 up to (excluding) 6.11.6 (NVD).
The vulnerability stems from a missing RCU (Read-Copy-Update) read-side critical section in the taprio_dump() function. When accessing the scheduler data structures, there was a potential for use-after-free conditions. The issue was discovered through KASAN (Kernel Address Sanitizer) which detected a slab-use-after-free error during memory access operations. The vulnerability has a CVSS v3.1 base score of 7.8 (HIGH) with vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, Kernel Patch).
The vulnerability could potentially allow an attacker with local access to cause a denial of service (system crash) or possibly execute arbitrary code. The high CVSS score indicates significant potential impact on system confidentiality, integrity, and availability if exploited (NVD).
The vulnerability has been fixed by adding an RCU read-side critical section in the taprio_dump() function. The fix has been implemented in various kernel versions through patches. System administrators should update their Linux kernel to the latest patched version. The fix addresses the issue by properly protecting the scheduler data structure access (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."