First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/xe/vm: move xa_alloc to prevent UAF Evil user can guess the next id of the vm before the ioctl completes and then call vm destroy ioctl to trigger UAF since create ioctl is still referencing the same vm. Move the xa_alloc all the way to the end to prevent this. v2: - Rebase (cherry picked from commit dcfd3971327f3ee92765154baebbaece833d3ca9)
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.8<6.11.3 | |
Linux Kernel | =6.12-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49865 has been rated as high severity due to the potential for a use-after-free vulnerability in the Linux kernel.
To fix CVE-2024-49865, you should update your Linux kernel to version 6.11.4 or later, or to 6.12-rc2 or later.
CVE-2024-49865 affects Linux kernel versions between 6.8 and 6.11.3 and version 6.12-rc1.
CVE-2024-49865 is a use-after-free vulnerability enabling unauthorized user actions that could lead to system instability.
Exploitation of CVE-2024-49865 requires local access to the system, making it a local privilege escalation issue.