CVE-2024-38570Use After Free in Linux

CWE-416Use After Free39 documents7 sources
Severity
7.8HIGHNVD
OSV6.5OSV5.5
EPSS
0.0%
top 98.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 19
Latest updateNov 19

Description

In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix potential glock use-after-free on unmount When a DLM lockspace is released and there ares still locks in that lockspace, DLM will unlock those locks automatically. Commit fb6791d100d1b started exploiting this behavior to speed up filesystem unmount: gfs2 would simply free glocks it didn't want to unlock and then release the lockspace. This didn't take the bast callbacks for asynchronous lock contention notifications

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages10 packages

Patches

🔴Vulnerability Details

19
OSV
linux-iot vulnerabilities2024-11-19
OSV
linux-azure-fde vulnerabilities2024-10-31
OSV
linux-azure vulnerabilities2024-10-17
OSV
linux-raspi-5.4 vulnerabilities2024-10-10
OSV
linux-azure-fde-5.15 vulnerabilities2024-10-03

📋Vendor Advisories

19
Ubuntu
Linux kernel (IoT) vulnerabilities2024-11-19
Ubuntu
Linux kernel vulnerabilities2024-10-31
Ubuntu
Linux kernel (Azure) vulnerabilities2024-10-17
Ubuntu
Linux kernel vulnerabilities2024-10-10
Ubuntu
Linux kernel vulnerabilities2024-10-03