In the Linux kernel, the following vulnerability has been resolved:
dmaengine: idxd: Avoid unnecessary destruction of file_ida
file_ida is allocated during cdev open and is freed accordingly
during cdev release. This sequence is guaranteed by driver file
operations. Therefore, there is no need to destroy an already empty
file_ida when the WQ cdev is removed.
Worse, ida_free() in cdev release may happen after destruction of
file_ida per WQ cdev. This can lead to accessing an id in file_ida
after it has been destroyed, resulting in a kernel panic.
Remove ida_destroy(&file_ida) to address these issues.
References
Configurations
Configuration 1 (hide)
|
History
03 Oct 2025, 14:53
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/15edb906211bf53e7b5574f7326ab734d6bff4f9 - Patch | |
References | () https://git.kernel.org/stable/c/76e43fa6a456787bad31b8d0daeabda27351a480 - Patch | |
References | () https://git.kernel.org/stable/c/9eb15f24a0b9b017b39cde8b8c07243676b63687 - Patch | |
CWE | CWE-416 | |
First Time |
Linux linux Kernel
Linux |
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/15edb906211bf53e7b5574f7326ab734d6bff4f9 - | |
References | () https://git.kernel.org/stable/c/76e43fa6a456787bad31b8d0daeabda27351a480 - | |
References | () https://git.kernel.org/stable/c/9eb15f24a0b9b017b39cde8b8c07243676b63687 - | |
Summary |
|
21 Jun 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-21 11:15
Updated : 2025-10-03 14:53
NVD link : CVE-2024-38629
Mitre link : CVE-2024-38629
CVE.ORG link : CVE-2024-38629
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free