CVE-2024-46849Use After Free in Linux

CWE-416Use After Free52 documents7 sources
Severity
7.8HIGHNVD
OSV8.8OSV6.7OSV6.3OSV5.5OSV4.7
EPSS
0.0%
top 95.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 27
Latest updateMay 28

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: meson: axg-card: fix 'use-after-free' Buffer 'card->dai_link' is reallocated in 'meson_card_reallocate_links()', so move 'pad' pointer initialization after this function when memory is already reallocated. Kasan bug report: BUG: KASAN: slab-use-after-free in axg_card_add_link+0x76c/0x9bc Read of size 8 at addr ffff000000e8b260 by task modprobe/356 CPU: 0 PID: 356 Comm: modprobe Tainted: G O 6.9.12-sdkernel #1 Call tra

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages12 packages

Patches

🔴Vulnerability Details

25
OSV
linux-raspi-5.4 vulnerabilities2025-05-28
OSV
linux-raspi vulnerabilities2025-05-28
OSV
linux-iot vulnerabilities2025-04-03
OSV
linux-aws-5.4 vulnerabilities2025-04-01
OSV
linux-fips vulnerabilities2025-03-28

📋Vendor Advisories

26
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-05-28
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-05-28
Ubuntu
Linux kernel (IoT) vulnerabilities2025-04-03
Ubuntu
Linux kernel (AWS) vulnerabilities2025-04-01
Ubuntu
Linux kernel (FIPS) vulnerabilities2025-03-28