CVE-2024-56653Use After Free in Linux

CWE-416Use After Free32 documents7 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 93.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 27
Latest updateMay 29

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btmtk: avoid UAF in btmtk_process_coredump hci_devcd_append may lead to the release of the skb, so it cannot be accessed once it is called. BUG: KASAN: slab-use-after-free in btmtk_process_coredump+0x2a7/0x2d0 [btmtk] Read of size 4 at addr ffff888033cfabb0 by task kworker/0:3/82 CPU: 0 PID: 82 Comm: kworker/0:3 Tainted: G U 6.6.40-lockdep-03464-g1d8b4eb3060e #1 b0b3c1cc0c842735643fb411799d97921d1f688c Hardware na

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages7 packages

Patches

🔴Vulnerability Details

15
OSV
Kernel Live Patch Security Notice2025-05-29
OSV
linux-raspi vulnerabilities2025-05-26
OSV
linux-azure-nvidia vulnerabilities2025-05-20
OSV
linux-raspi-realtime vulnerabilities2025-05-20
OSV
linux-azure-6.8 vulnerabilities2025-05-07

📋Vendor Advisories

16
Ubuntu
Kernel Live Patch Security Notice2025-05-29
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-05-26
Ubuntu
Linux kernel (Azure, N-Series) vulnerabilities2025-05-20
Ubuntu
Linux kernel (Raspberry Pi Real-time) vulnerabilities2025-05-20
Ubuntu
Linux kernel (Azure) vulnerabilities2025-05-07
CVE-2024-56653 — Use After Free in Linux | cvebase