First published: Thu Nov 07 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Don't free job in TDR Freeing job in TDR is not safe as TDR can pass the run_job thread resulting in UAF. It is only safe for free job to naturally be called by the scheduler. Rather free job in TDR, add to pending list. (cherry picked from commit ea2f6a77d0c40d97f4a4dc93fee4afe15d94926d)
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.10<6.11.6 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50149 is classified as a high severity vulnerability due to the potential for use-after-free conditions in the Linux kernel.
To fix CVE-2024-50149, update the Linux kernel to version 6.12 or later, or to the latest stable release beyond 6.11.6.
CVE-2024-50149 affects Linux kernel versions from 6.10 up to 6.11.6 and includes 6.12 release candidates (rc1, rc2, rc3).
The impact of CVE-2024-50149 may lead to system instability and potential exploitation through use-after-free vulnerabilities.
System administrators and users running the affected versions of the Linux kernel should be concerned about CVE-2024-50149 and take action to mitigate the risk.