In the Linux kernel, the following vulnerability has been resolved:
mac802154: Fix potential RCU dereference issue in mac802154scanworker
In the mac802154_scan_worker
function, the scan_req->type
field was
accessed after the RCU read-side critical section was unlocked. According
to RCU usage rules, this is illegal and can lead to unpredictable
behavior, such as accessing memory that has been updated or causing
use-after-free issues.
This possible bug was identified using a static analysis tool developed by myself, specifically designed to detect RCU-related issues.
To address this, the scan_req->type
value is now stored in a local
variable scan_req_type
while still within the RCU read-side critical
section. The scan_req_type
is then used after the RCU lock is released,
ensuring that the type value is safely accessed without violating RCU
rules.