Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Skip restore TC rules for vport rep without loaded flag During driver unload, unregister_netdev is called after unloading vport rep. So, the mlx5e_rep_priv is already freed while trying to get rpriv->netdev, or walk rpriv->tc_ht, which results in use-after-free. So add the checking to make sure access the data of vport rep which is still loaded.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.6, < 6.6.70 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/3e45dd1622a2c1a83c11bf42fdd8c1810123d6c0Patch
- https://git.kernel.org/stable/c/47c78d3fc26e38ab805613a0f592dc8a820c7c64Patch
- https://git.kernel.org/stable/c/5a03b368562a7ff5f5f1f63b5adf8309cbdbd5bePatch
FAQ
What is CVE-2024-57801?
CVE-2024-57801 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Skip restore TC rules for vport rep without loaded flag During driver unload, unregister_netdev is called after unloadi...
How severe is CVE-2024-57801?
CVE-2024-57801 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-57801?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.