CVE-2024-56551Use After Free in Linux

CWE-416Use After Free94 documents7 sources
Severity
7.8HIGHNVD
OSV8.8OSV5.9OSV5.5OSV4.4
EPSS
0.0%
top 99.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 27
Latest updateJul 18

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147 [ +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1 [ +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020 [ +0.000016] Call Trace: [ +0.0000

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages9 packages

Patches

🔴Vulnerability Details

46
OSV
linux-intel-iotg-5.15 vulnerabilities2025-07-18
OSV
linux-iot vulnerabilities2025-07-16
OSV
linux-raspi, linux-raspi-5.4 vulnerabilities2025-07-16
OSV
linux-bluefield vulnerabilities2025-07-03
OSV
linux-hwe-5.4 vulnerabilities2025-06-30

📋Vendor Advisories

47
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2025-07-18
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-07-16
Ubuntu
Linux kernel (IoT) vulnerabilities2025-07-16
Ubuntu
Kernel Live Patch Security Notice2025-07-10
Ubuntu
Linux kernel (BlueField) vulnerabilities2025-07-03
CVE-2024-56551 — Use After Free in Linux | cvebase