CVE-2024-40909

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
12/07/2024
Last modified:
29/08/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Fix a potential use-after-free in bpf_link_free()<br /> <br /> After commit 1a80dbcb2dba, bpf_link can be freed by<br /> link-&gt;ops-&gt;dealloc_deferred, but the code still tests and uses<br /> link-&gt;ops-&gt;dealloc afterward, which leads to a use-after-free as<br /> reported by syzbot. Actually, one of them should be sufficient, so<br /> just call one of them instead of both. Also add a WARN_ON() in case<br /> of any problematic implementation.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.26 (including) 6.6.35 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.9.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*