Use After Free Vulnerability in Linux Kernel Affecting Trace Events
CVE-2024-49570
Summary
A vulnerability has been identified in the Linux kernel affecting trace events, notably within the drm/xe/tracing context. This issue arises due to a use after free (UAF) condition that could potentially lead to memory dereference errors during the TP_printk logging process. Specifically, the situation can occur in the xe_bo_move trace event when the xe_mem_type_to_name array is improperly handled. Remediation has been achieved through code fixes that ensure proper checks are made before dereferencing memory. Users are advised to implement explicit backporting measures for kernels prior to version 6.10 to protect against potential exploits.
Affected Version(s)
Linux e46d3f813abd2383881c66d21ba04cee9fbdf3a9 < 62cd174616ae3bf8a6cf468718f1ae74e5a07727
Linux e46d3f813abd2383881c66d21ba04cee9fbdf3a9
Linux e46d3f813abd2383881c66d21ba04cee9fbdf3a9 < 07089083a526ea19daa72a1edf9d6e209615b77c
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved