CVE-2024-38629
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
21/06/2024
Last modified:
03/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
dmaengine: idxd: Avoid unnecessary destruction of file_ida<br />
<br />
file_ida is allocated during cdev open and is freed accordingly<br />
during cdev release. This sequence is guaranteed by driver file<br />
operations. Therefore, there is no need to destroy an already empty<br />
file_ida when the WQ cdev is removed.<br />
<br />
Worse, ida_free() in cdev release may happen after destruction of<br />
file_ida per WQ cdev. This can lead to accessing an id in file_ida<br />
after it has been destroyed, resulting in a kernel panic.<br />
<br />
Remove ida_destroy(&file_ida) to address these issues.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.4 (including) | 6.6.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/15edb906211bf53e7b5574f7326ab734d6bff4f9
- https://git.kernel.org/stable/c/76e43fa6a456787bad31b8d0daeabda27351a480
- https://git.kernel.org/stable/c/9eb15f24a0b9b017b39cde8b8c07243676b63687
- https://git.kernel.org/stable/c/15edb906211bf53e7b5574f7326ab734d6bff4f9
- https://git.kernel.org/stable/c/76e43fa6a456787bad31b8d0daeabda27351a480
- https://git.kernel.org/stable/c/9eb15f24a0b9b017b39cde8b8c07243676b63687



