Description
In the Linux kernel, the following vulnerability has been resolved: md: fix rcu protection in md_wakeup_thread We attempted to use RCU to protect the pointer 'thread', but directly passed the value when calling md_wakeup_thread(). This means that the RCU pointer has been acquired before rcu_read_lock(), which renders rcu_read_lock() ineffective and could lead to a use-after-free.
Product status
4469315439827290923fce4f3f672599cabeb366 (git) before 21989cb5034c835b212385a2afadf279d8069da0
4469315439827290923fce4f3f672599cabeb366 (git) before a4bd1caf591faeae44cb10b6517e7dacb5139bda
4469315439827290923fce4f3f672599cabeb366 (git) before f98b191f78124405294481dea85f8a22a3eb0a59
4469315439827290923fce4f3f672599cabeb366 (git) before 0dc76205549b4c25705e54345f211b9f66e018a0
6.5
Any version before 6.5
6.12.63 (semver)
6.17.13 (semver)
6.18.2 (semver)
6.19-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/21989cb5034c835b212385a2afadf279d8069da0
git.kernel.org/...c/a4bd1caf591faeae44cb10b6517e7dacb5139bda
git.kernel.org/...c/f98b191f78124405294481dea85f8a22a3eb0a59
git.kernel.org/...c/0dc76205549b4c25705e54345f211b9f66e018a0
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.