First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors x86_android_tablet_remove() frees the pdevs[] array, so it should not be used after calling x86_android_tablet_remove(). When platform_device_register() fails, store the pdevs[x] PTR_ERR() value into the local ret variable before calling x86_android_tablet_remove() to avoid using pdevs[] after it has been freed.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.17<6.6.55 | |
Linux Kernel | >=6.7<6.10.14 | |
Linux Kernel | >=6.11<6.11.3 | |
Linux Kernel | =6.12-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49986 has a medium severity rating as it involves a use after free condition that can potentially lead to system instability.
To mitigate CVE-2024-49986, update the Linux kernel to a version that includes the patch for this vulnerability.
CVE-2024-49986 affects Linux kernel versions between 5.17 and 6.6.55, 6.7 and 6.10.14, and 6.11 and 6.11.3, along with the version 6.12-rc1.
CVE-2024-49986 involves a use after free vulnerability in the x86-android-tablets platform implementation of the Linux kernel.
CVE-2024-49986 primarily affects system stability rather than being a remotely exploitable vulnerability.