CVE-2024-42280Use After Free in Linux

CWE-416Use After Free54 documents7 sources
Severity
7.8HIGHNVD
OSV8.8OSV7.1OSV5.5
EPSS
0.0%
top 98.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 17
Latest updateJan 9

Description

In the Linux kernel, the following vulnerability has been resolved: mISDN: Fix a use after free in hfcmulti_tx() Don't dereference *sp after calling dev_kfree_skb(*sp).

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages10 packages

NVDlinux/linux_kernel2.6.274.19.320+6
Debianlinux/linux_kernel< 5.10.226-1+3
Ubuntulinux/linux_kernel< 5.4.0-200.220+4
CVEListV5linux/linuxaf69fb3a8ffa37e986db00ed93099dc44babeef470db2c84631f50e02e6b32b543700699dd395803+8
debiandebian/linux< linux 6.1.106-1 (bookworm)

Patches

🔴Vulnerability Details

26
OSV
linux-azure-5.15 vulnerabilities2025-01-09
OSV
linux-gkeop vulnerabilities2024-12-12
OSV
linux-intel-iotg, linux-intel-iotg-5.15 vulnerabilities2024-12-09
OSV
linux-azure vulnerabilities2024-11-20
OSV
linux-iot vulnerabilities2024-11-19

📋Vendor Advisories

27
Ubuntu
Linux kernel (Azure) vulnerabilities2025-01-09
Ubuntu
Linux kernel (GKE) vulnerabilities2024-12-12
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2024-12-09
Ubuntu
Linux kernel (Azure) vulnerabilities2024-11-20
Ubuntu
Linux kernel (IoT) vulnerabilities2024-11-19