Vulnerability Details : CVE-2024-46849
In the Linux kernel, the following vulnerability has been resolved:
ASoC: meson: axg-card: fix 'use-after-free'
Buffer 'card->dai_link' is reallocated in 'meson_card_reallocate_links()',
so move 'pad' pointer initialization after this function when memory is
already reallocated.
Kasan bug report:
==================================================================
BUG: KASAN: slab-use-after-free in axg_card_add_link+0x76c/0x9bc
Read of size 8 at addr ffff000000e8b260 by task modprobe/356
CPU: 0 PID: 356 Comm: modprobe Tainted: G O 6.9.12-sdkernel #1
Call trace:
dump_backtrace+0x94/0xec
show_stack+0x18/0x24
dump_stack_lvl+0x78/0x90
print_report+0xfc/0x5c0
kasan_report+0xb8/0xfc
__asan_load8+0x9c/0xb8
axg_card_add_link+0x76c/0x9bc [snd_soc_meson_axg_sound_card]
meson_card_probe+0x344/0x3b8 [snd_soc_meson_card_utils]
platform_probe+0x8c/0xf4
really_probe+0x110/0x39c
__driver_probe_device+0xb8/0x18c
driver_probe_device+0x108/0x1d8
__driver_attach+0xd0/0x25c
bus_for_each_dev+0xe0/0x154
driver_attach+0x34/0x44
bus_add_driver+0x134/0x294
driver_register+0xa8/0x1e8
__platform_driver_register+0x44/0x54
axg_card_pdrv_init+0x20/0x1000 [snd_soc_meson_axg_sound_card]
do_one_initcall+0xdc/0x25c
do_init_module+0x10c/0x334
load_module+0x24c4/0x26cc
init_module_from_file+0xd4/0x128
__arm64_sys_finit_module+0x1f4/0x41c
invoke_syscall+0x60/0x188
el0_svc_common.constprop.0+0x78/0x13c
do_el0_svc+0x30/0x40
el0_svc+0x38/0x78
el0t_64_sync_handler+0x100/0x12c
el0t_64_sync+0x190/0x194
Vulnerability category: Memory Corruption
Products affected by CVE-2024-46849
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-46849
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 11 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-46849
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-10-02 |
CWE ids for CVE-2024-46849
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2024-46849
-
https://git.kernel.org/stable/c/e1a199ec31617242e1a0ea8f312341e682d0c037
ASoC: meson: axg-card: fix 'use-after-free' - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/7d318166bf55e9029d56997c3b134f4ac2ae2607
ASoC: meson: axg-card: fix 'use-after-free' - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/5a2cc2bb81399e9ebc72560541137eb04d61dc3d
ASoC: meson: axg-card: fix 'use-after-free' - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/e43364f578cdc2f8083abbc0cb743ea55e827c29
ASoC: meson: axg-card: fix 'use-after-free' - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/4f9a71435953f941969a4f017e2357db62d85a86
ASoC: meson: axg-card: fix 'use-after-free' - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/fb0530025d502cb79d2b2801b14a9d5261833f1a
ASoC: meson: axg-card: fix 'use-after-free' - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/a33145f494e6cb82f3e018662cc7c4febf271f22
ASoC: meson: axg-card: fix 'use-after-free' - kernel/git/stable/linux.git - Linux kernel stable tree
Jump to