In the Linux kernel, the following vulnerability has been resolved:
ALSA: 6fire: Release resources at card release
The current 6fire code tries to release the resources right after the
call of usb6fire_chip_abort(). But at this moment, the card object
might be still in use (as we're calling snd_card_free_when_closed()).
For avoid potential UAFs, move the release of resources to the card's
private_free instead of the manual call of usb6fire_chip_destroy() at
the USB disconnect callback.
References
Configurations
Configuration 1 (hide)
|
History
03 Feb 2025, 15:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/0df7f4b5cc10f5adf98be0845372e9eef7bb5b09 - Patch | |
References | () https://git.kernel.org/stable/c/273eec23467dfbfbd0e4c10302579ba441fb1e13 - Patch | |
References | () https://git.kernel.org/stable/c/57860a80f03f9dc69a34a5c37b0941ad032a0a8c - Patch | |
References | () https://git.kernel.org/stable/c/74357d0b5cd3ef544752bc9f21cbeee4902fae6c - Patch | |
References | () https://git.kernel.org/stable/c/a0810c3d6dd2d29a9b92604d682eacd2902ce947 - Patch | |
References | () https://git.kernel.org/stable/c/b754e831a94f82f2593af806741392903f359168 - Patch | |
References | () https://git.kernel.org/stable/c/b889a7d68d7e76b8795b754a75c91a2d561d5e8c - Patch | |
References | () https://git.kernel.org/stable/c/ea8cc56db659cf0ae57073e32a4735ead7bd7ee3 - Patch | |
References | () https://git.kernel.org/stable/c/f2d06d4e129e2508e356136f99bb20a332ff1a00 - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-416 | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
27 Dec 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-27 14:15
Updated : 2025-02-10 18:15
NVD link : CVE-2024-53239
Mitre link : CVE-2024-53239
CVE.ORG link : CVE-2024-53239
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free