CVE-2024-47691Use After Free in Linux

CWE-416Use After Free62 documents7 sources
Severity
7.8HIGHNVD
OSV8.8OSV5.5
EPSS
0.0%
top 97.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 21
Latest updateJan 12

Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread() syzbot reports a f2fs bug as below: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114 print_report+0xe8/0x550 mm/kasan/report.c:491 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 instrument_atomic_read_write include/linux/instrumented.h:96 [inline] atomic_fetch_add_relaxed inc

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages10 packages

Patches

🔴Vulnerability Details

30
OSV
linux-iot vulnerabilities2026-01-12
OSV
linux-kvm vulnerabilities2026-01-09
OSV
linux-raspi, linux-raspi-5.4 vulnerabilities2026-01-06
OSV
linux-oracle-5.4 vulnerabilities2025-12-19
OSV
linux-raspi vulnerabilities2025-12-19

📋Vendor Advisories

31
Ubuntu
Linux kernel (IoT) vulnerabilities2026-01-12
Ubuntu
Linux kernel (KVM) vulnerabilities2026-01-09
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2026-01-06
Ubuntu
Linux kernel (Oracle) vulnerabilities2025-12-19
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-12-19
CVE-2024-47691 — Use After Free in Linux | cvebase