CVE-2024-53239

In the Linux kernel, the following vulnerability has been resolved: ALSA: 6fire: Release resources at card release The current 6fire code tries to release the resources right after the call of usb6fire_chip_abort(). But at this moment, the card object might be still in use (as we're calling snd_card_free_when_closed()). For avoid potential UAFs, move the release of resources to the card's private_free instead of the manual call of usb6fire_chip_destroy() at the USB disconnect callback.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Feb 2025, 15:18

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0df7f4b5cc10f5adf98be0845372e9eef7bb5b09 - () https://git.kernel.org/stable/c/0df7f4b5cc10f5adf98be0845372e9eef7bb5b09 - Patch
References () https://git.kernel.org/stable/c/273eec23467dfbfbd0e4c10302579ba441fb1e13 - () https://git.kernel.org/stable/c/273eec23467dfbfbd0e4c10302579ba441fb1e13 - Patch
References () https://git.kernel.org/stable/c/57860a80f03f9dc69a34a5c37b0941ad032a0a8c - () https://git.kernel.org/stable/c/57860a80f03f9dc69a34a5c37b0941ad032a0a8c - Patch
References () https://git.kernel.org/stable/c/74357d0b5cd3ef544752bc9f21cbeee4902fae6c - () https://git.kernel.org/stable/c/74357d0b5cd3ef544752bc9f21cbeee4902fae6c - Patch
References () https://git.kernel.org/stable/c/a0810c3d6dd2d29a9b92604d682eacd2902ce947 - () https://git.kernel.org/stable/c/a0810c3d6dd2d29a9b92604d682eacd2902ce947 - Patch
References () https://git.kernel.org/stable/c/b754e831a94f82f2593af806741392903f359168 - () https://git.kernel.org/stable/c/b754e831a94f82f2593af806741392903f359168 - Patch
References () https://git.kernel.org/stable/c/b889a7d68d7e76b8795b754a75c91a2d561d5e8c - () https://git.kernel.org/stable/c/b889a7d68d7e76b8795b754a75c91a2d561d5e8c - Patch
References () https://git.kernel.org/stable/c/ea8cc56db659cf0ae57073e32a4735ead7bd7ee3 - () https://git.kernel.org/stable/c/ea8cc56db659cf0ae57073e32a4735ead7bd7ee3 - Patch
References () https://git.kernel.org/stable/c/f2d06d4e129e2508e356136f99bb20a332ff1a00 - () https://git.kernel.org/stable/c/f2d06d4e129e2508e356136f99bb20a332ff1a00 - Patch
First Time Linux linux Kernel
Linux
CWE CWE-416
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: 6fire: Liberar recursos al liberar la tarjeta El código 6fire actual intenta liberar los recursos justo después de la llamada a usb6fire_chip_abort(). Pero en este momento, el objeto de la tarjeta podría estar todavía en uso (ya que estamos llamando a snd_card_free_when_closed()). Para evitar posibles UAF, mueva la liberación de recursos a private_free de la tarjeta en lugar de la llamada manual a usb6fire_chip_destroy() en la devolución de llamada de desconexión USB.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

27 Dec 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 14:15

Updated : 2025-02-10 18:15


NVD link : CVE-2024-53239

Mitre link : CVE-2024-53239

CVE.ORG link : CVE-2024-53239


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free