First published: Sat Jan 11 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: block: avoid to reuse `hctx` not removed from cpuhp callback list If the 'hctx' isn't removed from cpuhp callback list, we can't reuse it, otherwise use-after-free may be triggered.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41149 has been classified as a high severity vulnerability due to its potential for causing use-after-free conditions in the Linux kernel.
CVE-2024-41149 affects the Linux kernel, particularly configurations that utilize the block subsystem.
To fix CVE-2024-41149, it is recommended to update the Linux kernel to the latest stable version where this vulnerability has been patched.
If an immediate update is not possible, consider implementing workarounds or applying additional security measures to mitigate the risk associated with CVE-2024-41149.
CVE-2024-41149 can lead to system instability and potential crashes due to the use-after-free vulnerability, which may be exploited by a malicious actor.