CVE-2024-54458
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
27/02/2025
Last modified:
02/05/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: ufs: bsg: Set bsg_queue to NULL after removal<br />
<br />
Currently, this does not cause any issues, but I believe it is necessary to<br />
set bsg_queue to NULL after removing it to prevent potential use-after-free<br />
(UAF) access.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.129 (excluding) | |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.79 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.16 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1e95c798d8a7f70965f0f88d4657b682ff0ec75f
- https://git.kernel.org/stable/c/22018622e1e9e371198dbd983af946a844d5924c
- https://git.kernel.org/stable/c/5e7b6e44468c3242c21c2a8656d009fb3eb50a73
- https://git.kernel.org/stable/c/5f782d4741bf558def60df192b858b0efc6a5f0a
- https://git.kernel.org/stable/c/88a01e9c9ad40c075756ba93b47984461d4ff15d
- https://git.kernel.org/stable/c/9193bdc170cc23fe98aca71d1a63c0bf6e1e853b
- https://git.kernel.org/stable/c/bb4783c670180b922267222408e1c48d22dfbb46