CVE-2024-38581Use After Free in Linux

CWE-416Use After Free6 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 98.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 19

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/mes: fix use-after-free issue Delete fence fallback timer to fix the ramdom use-after-free issue. v2: move to amdgpu_mes.c

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages9 packages

NVDlinux/linux_kernel4.206.1.93+3
Debianlinux/linux_kernel< 6.1.94-1+2
CVEListV5linux/linux8c5e13ec6a2c26d31d0551dc382661dc10823be070b1bf6d9edc8692d241f59a65f073aec6d501de+4

Patches

🔴Vulnerability Details

2
OSV
CVE-2024-38581: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/mes: fix use-after-free issue Delete fence fallback timer to fix the ra2024-06-19
GHSA
GHSA-8m45-p293-9xvp: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/mes: fix use-after-free issue Delete fence fallback timer to fix the2024-06-19

📋Vendor Advisories

3
Red Hat
kernel: drm/amdgpu/mes: fix use-after-free issue2024-06-19
Microsoft
drm/amdgpu/mes: fix use-after-free issue2024-06-11
Debian
CVE-2024-38581: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/...2024