CVE-2024-47730Use After Free in Linux

CWE-416Use After Free58 documents7 sources
Severity
7.8HIGHNVD
OSV8.8
EPSS
0.0%
top 98.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 21
Latest updateApr 28

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - inject error before stopping queue The master ooo cannot be completely closed when the accelerator core reports memory error. Therefore, the driver needs to inject the qm error to close the master ooo. Currently, the qm error is injected after stopping queue, memory may be released immediately after stopping queue, causing the device to access the released memory. Therefore, error is injected to close ma

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages12 packages

Patches

🔴Vulnerability Details

28
OSV
linux-gcp-5.15 vulnerabilities2025-04-28
OSV
linux-azure-nvidia vulnerabilities2025-04-28
OSV
linux-intel-iotg-5.15 vulnerabilities2025-04-24
OSV
linux-ibm-5.15 vulnerabilities2025-04-24
OSV
linux-azure-5.15, linux-azure-fde-5.15 vulnerabilities2025-04-07

📋Vendor Advisories

29
Ubuntu
Linux kernel (GCP) vulnerabilities2025-04-28
Ubuntu
Linux kernel (Azure, N-Series) vulnerabilities2025-04-28
Ubuntu
Linux kernel (IBM) vulnerabilities2025-04-24
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2025-04-24
Ubuntu
Linux kernel (Azure) vulnerabilities2025-04-07
CVE-2024-47730 — Use After Free in Linux | cvebase