CVE-2024-49852

In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after free. Re-order these lines to avoid the use after free.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Oct 2024, 16:14

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: elx: libefc: Se corrige el potencial use after freea nport->release si el recuento de referencias cae a cero. La función de liberación nport->release es _efc_nport_free() que libera "nport". Pero luego desreferenciamos "nport" en la siguiente línea que es un use after free. Reordena estas líneas para evitar el use after free.
First Time Linux linux Kernel
Linux
CWE CWE-416
References () https://git.kernel.org/stable/c/16a570f07d870a285b0c0b0d1ca4dff79e8aa5ff - () https://git.kernel.org/stable/c/16a570f07d870a285b0c0b0d1ca4dff79e8aa5ff - Patch
References () https://git.kernel.org/stable/c/2e4b02fad094976763af08fec2c620f4f8edd9ae - () https://git.kernel.org/stable/c/2e4b02fad094976763af08fec2c620f4f8edd9ae - Patch
References () https://git.kernel.org/stable/c/7c2908985e4ae0ea1b526b3916de9e5351650908 - () https://git.kernel.org/stable/c/7c2908985e4ae0ea1b526b3916de9e5351650908 - Patch
References () https://git.kernel.org/stable/c/98752fcd076a8cbc978016eae7125b4971be1eec - () https://git.kernel.org/stable/c/98752fcd076a8cbc978016eae7125b4971be1eec - Patch
References () https://git.kernel.org/stable/c/abc71e89170ed32ecf0a5a29f31aa711e143e941 - () https://git.kernel.org/stable/c/abc71e89170ed32ecf0a5a29f31aa711e143e941 - Patch
References () https://git.kernel.org/stable/c/baeb8628ab7f4577740f00e439d3fdf7c876b0ff - () https://git.kernel.org/stable/c/baeb8628ab7f4577740f00e439d3fdf7c876b0ff - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

21 Oct 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 13:15

Updated : 2024-10-23 16:14


NVD link : CVE-2024-49852

Mitre link : CVE-2024-49852

CVE.ORG link : CVE-2024-49852


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free