CVE-2024-39496Use After Free in Linux

CWE-416Use After Free30 documents7 sources
Severity
7.8HIGHNVD
OSV5.5
EPSS
0.0%
top 96.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 12
Latest updateOct 31

Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix use-after-free due to race with dev replace While loading a zone's info during creation of a block group, we can race with a device replace operation and then trigger a use-after-free on the device that was just replaced (source device of the replace operation). This happens because at btrfs_load_zone_info() we extract a device from the chunk map into a local variable and then use the device while not under

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages11 packages

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

14
OSV
linux-azure-fde vulnerabilities2024-10-31
OSV
linux-azure-fde-5.15 vulnerabilities2024-10-03
OSV
linux-lowlatency, linux-lowlatency-hwe-5.15 vulnerabilities2024-09-26
OSV
linux-ibm-5.15, linux-oracle-5.15, linux-xilinx-zynqmp vulnerabilities2024-09-23
OSV
linux-hwe-6.82024-09-23

📋Vendor Advisories

15
Ubuntu
Linux kernel vulnerabilities2024-10-31
Ubuntu
Linux kernel vulnerabilities2024-10-03
Ubuntu
Linux kernel vulnerabilities2024-09-26
Ubuntu
Linux kernel vulnerabilities2024-09-23
Ubuntu
Linux kernel vulnerabilities2024-09-23