First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after free. Re-order these lines to avoid the use after free.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=5.14<5.15.168 | |
Linux kernel | >=5.16<6.1.113 | |
Linux kernel | >=6.2<6.6.54 | |
Linux kernel | >=6.7<6.10.13 | |
Linux kernel | >=6.11<6.11.2 | |
Linux Kernel | >=5.14<5.15.168 | |
Linux Kernel | >=5.16<6.1.113 | |
Linux Kernel | >=6.2<6.6.54 | |
Linux Kernel | >=6.7<6.10.13 | |
Linux Kernel | >=6.11<6.11.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 | |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49852 is classified as a medium severity vulnerability in the Linux Kernel.
To fix CVE-2024-49852, users should upgrade their Linux Kernel to the latest stable version that includes the security patch.
CVE-2024-49852 affects multiple Linux Kernel versions from 5.14 up to before 5.15.168 and several versions within the 5.16 to 6.6 range.
CVE-2024-49852 does not explicitly indicate that it is a remote vulnerability but may allow for local privilege escalation.
The Linux kernel development community is responsible for addressing and fixing CVE-2024-49852.