7.8
CWE
416
Advisory Published
CVE Published
Updated

CVE-2024-27043: media: edia: dvbdev: fix a use-after-free

First published: Wed May 01 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: media: edia: dvbdev: fix a use-after-free In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed in several error-handling paths. However, *pdvbdev is not set to NULL after dvbdev's deallocation, causing use-after-frees in many places, for example, in the following call chain: budget_register |-> dvb_dmxdev_init |-> dvb_register_device |-> dvb_dmxdev_release |-> dvb_unregister_device |-> dvb_remove_device |-> dvb_device_put |-> kref_put When calling dvb_unregister_device, dmxdev->dvbdev (i.e. *pdvbdev in dvb_register_device) could point to memory that had been freed in dvb_register_device. Thereafter, this pointer is transferred to kref_put and triggering a use-after-free.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
redhat/kernel<4.19.311
4.19.311
redhat/kernel<5.4.273
5.4.273
redhat/kernel<5.10.214
5.10.214
redhat/kernel<5.15.153
5.15.153
redhat/kernel<6.1.83
6.1.83
redhat/kernel<6.6.23
6.6.23
redhat/kernel<6.7.11
6.7.11
redhat/kernel<6.8.2
6.8.2
redhat/kernel<6.9
6.9
>=2.6.21<4.19.311
>=4.20<5.4.273
>=5.5<5.10.214
>=5.11<5.15.153
>=5.16<6.1.83
>=6.2<6.6.23
>=6.7<6.7.11
>=6.8<6.8.2
Linux Kernel>=2.6.21<4.19.311
Linux Kernel>=4.20<5.4.273
Linux Kernel>=5.5<5.10.214
Linux Kernel>=5.11<5.15.153
Linux Kernel>=5.16<6.1.83
Linux Kernel>=6.2<6.6.23
Linux Kernel>=6.7<6.7.11
Linux Kernel>=6.8<6.8.2
debian/linux
5.10.223-1
5.10.226-1
6.1.123-1
6.1.119-1
6.12.10-1
6.12.11-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-27043?

    CVE-2024-27043 is classified with a high severity due to a use-after-free vulnerability in the Linux kernel.

  • How do I fix CVE-2024-27043?

    To fix CVE-2024-27043, update to the latest kernel versions including 4.19.311, 5.4.273, 5.10.214, 5.15.153, 6.1.83, 6.6.23, 6.7.11, 6.8.2, or any newer versions available.

  • What systems are affected by CVE-2024-27043?

    CVE-2024-27043 affects various versions of the Linux kernel, specifically those prior to versions 4.19.311, 5.4.273, 5.10.214, 5.15.153, 6.1.83, and others.

  • Is CVE-2024-27043 actively exploited?

    There is currently no publicly available information indicating that CVE-2024-27043 is being actively exploited in the wild.

  • Who is responsible for addressing CVE-2024-27043?

    The maintainers of the Linux kernel are responsible for addressing CVE-2024-27043 through patch releases distributed to users.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203