CVE-2024-56581Use After Free in Linux

CWE-416Use After Free89 documents8 sources
Severity
7.8HIGHNVD
OSV8.8OSV5.5OSV4.7
EPSS
0.0%
top 98.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 27
Latest updateApr 13

Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: ref-verify: fix use-after-free after invalid ref action At btrfs_ref_tree_mod() after we successfully inserted the new ref entry (local variable 'ref') into the respective block entry's rbtree (local variable 'be'), if we find an unexpected action of BTRFS_DROP_DELAYED_REF, we error out and free the ref entry without removing it from the block entry's rbtree. Then in the error path of btrfs_ref_tree_mod() we call btrfs_

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages10 packages

Patches

🔴Vulnerability Details

43
OSV
linux-azure, linux-azure-4.15 vulnerabilities2026-03-24
OSV
linux-azure vulnerabilities2026-03-24
OSV
linux-azure-fips vulnerabilities2026-03-24
OSV
linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle vulnerabilities2026-03-20
OSV
linux-aws-fips, linux-fips, linux-gcp-fips vulnerabilities2026-03-20

📋Vendor Advisories

45
Ubuntu
Kernel Live Patch Security Notice2026-04-13
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2026-03-24
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-24
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-24
Ubuntu
Linux kernel (FIPS) vulnerabilities2026-03-20
CVE-2024-56581 — Use After Free in Linux | cvebase