CVE-2024-49852
scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after free. Re-order these lines to avoid the use after free.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 21, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
fcd427303eb90aa3cb08e7e0b68e0e67a6d47346 < 16a570f07d870a285b0c0b0d1ca4dff79e8aa5ff fcd427303eb90aa3cb08e7e0b68e0e67a6d47346 < abc71e89170ed32ecf0a5a29f31aa711e143e941 fcd427303eb90aa3cb08e7e0b68e0e67a6d47346 < baeb8628ab7f4577740f00e439d3fdf7c876b0ff fcd427303eb90aa3cb08e7e0b68e0e67a6d47346 < 7c2908985e4ae0ea1b526b3916de9e5351650908 fcd427303eb90aa3cb08e7e0b68e0e67a6d47346 < 98752fcd076a8cbc978016eae7125b4971be1eec fcd427303eb90aa3cb08e7e0b68e0e67a6d47346 < 2e4b02fad094976763af08fec2c620f4f8edd9ae
Linux / Linux
5.14
References
git.kernel.org: https://git.kernel.org/stable/c/16a570f07d870a285b0c0b0d1ca4dff79e8aa5ff git.kernel.org: https://git.kernel.org/stable/c/abc71e89170ed32ecf0a5a29f31aa711e143e941 git.kernel.org: https://git.kernel.org/stable/c/baeb8628ab7f4577740f00e439d3fdf7c876b0ff git.kernel.org: https://git.kernel.org/stable/c/7c2908985e4ae0ea1b526b3916de9e5351650908 git.kernel.org: https://git.kernel.org/stable/c/98752fcd076a8cbc978016eae7125b4971be1eec git.kernel.org: https://git.kernel.org/stable/c/2e4b02fad094976763af08fec2c620f4f8edd9ae lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html