CVE-2024-35955Use After Free in Linux

CWE-416Use After Free49 documents8 sources
Severity
8.8HIGHNVD
OSV7.0OSV6.8OSV5.5
EPSS
0.3%
top 43.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 20
Latest updateSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: kprobes: Fix possible use-after-free issue on kprobe registration When unloading a module, its state is changing MODULE_STATE_LIVE -> MODULE_STATE_GOING -> MODULE_STATE_UNFORMED. Each change will take a time. `is_module_text_address()` and `__module_text_address()` works with MODULE_STATE_LIVE and MODULE_STATE_GOING. If we use `is_module_text_address()` and `__module_text_address()` separately, there is a chance that the first

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages9 packages

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

23
OSV
linux-xilinx-zynqmp vulnerabilities2024-09-18
OSV
linux-oracle vulnerabilities2024-08-28
OSV
linux-azure, linux-azure-4.15 vulnerabilities2024-08-23
OSV
linux-aws, linux-aws-hwe vulnerabilities2024-08-22
OSV
linux, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm vulnerabilities2024-08-21

📋Vendor Advisories

24
Ubuntu
Linux kernel vulnerabilities2024-09-18
Ubuntu
Linux kernel (Oracle) vulnerabilities2024-08-28
Ubuntu
Linux kernel (Azure) vulnerabilities2024-08-23
Ubuntu
Linux kernel (AWS) vulnerabilities2024-08-22
Ubuntu
Linux kernel vulnerabilities2024-08-21

💬Community

1
Bugzilla
CVE-2024-35955 kernel: kprobes: Fix possible use-after-free issue on kprobe registration2024-05-20