๐Ÿ” CVE Alert

CVE-2024-49924

UNKNOWN 0.0

fbdev: pxafb: Fix possible use after free in pxafb_task()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: fbdev: pxafb: Fix possible use after free in pxafb_task() In the pxafb_probe function, it calls the pxafb_init_fbinfo function, after which &fbi->task is associated with pxafb_task. Moreover, within this pxafb_init_fbinfo function, the pxafb_blank function within the &pxafb_ops struct is capable of scheduling work. If we remove the module which will call pxafb_remove to make cleanup, it will call unregister_framebuffer function which can call do_unregister_framebuffer to free fbi->fb through put_fb_info(fb_info), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows: CPU0 CPU1 | pxafb_task pxafb_remove | unregister_framebuffer(info) | do_unregister_framebuffer(fb_info) | put_fb_info(fb_info) | // free fbi->fb | set_ctrlr_state(fbi, state) | __pxafb_lcd_power(fbi, 0) | fbi->lcd_power(on, &fbi->fb.var) | //use fbi->fb Fix it by ensuring that the work is canceled before proceeding with the cleanup in pxafb_remove. Note that only root user can remove the driver at runtime.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
9f17f2874834f4cdbe48cc05676d8f7558793204 < e657fa2df4429f3805a9b3e47fb1a4a1b02a72bd 9f17f2874834f4cdbe48cc05676d8f7558793204 < 6d0a07f68b66269e167def6c0b90a219cd3e7473 9f17f2874834f4cdbe48cc05676d8f7558793204 < e6897e299f57b103e999e62010b88e363b3eebae 9f17f2874834f4cdbe48cc05676d8f7558793204 < 4cda484e584be34d55ee17436ebf7ad11922b97a 9f17f2874834f4cdbe48cc05676d8f7558793204 < 3c0d416eb4bef705f699213cee94bf54b6acdacd 9f17f2874834f4cdbe48cc05676d8f7558793204 < fdda354f60a576d52dcf90351254714681df4370 9f17f2874834f4cdbe48cc05676d8f7558793204 < aaadc0cb05c999ccd8898a03298b7e5c31509b08 9f17f2874834f4cdbe48cc05676d8f7558793204 < a3a855764dbacbdb1cc51e15dc588f2d21c93e0e 9f17f2874834f4cdbe48cc05676d8f7558793204 < 4a6921095eb04a900e0000da83d9475eb958e61e
Linux / Linux
2.6.27

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e657fa2df4429f3805a9b3e47fb1a4a1b02a72bd git.kernel.org: https://git.kernel.org/stable/c/6d0a07f68b66269e167def6c0b90a219cd3e7473 git.kernel.org: https://git.kernel.org/stable/c/e6897e299f57b103e999e62010b88e363b3eebae git.kernel.org: https://git.kernel.org/stable/c/4cda484e584be34d55ee17436ebf7ad11922b97a git.kernel.org: https://git.kernel.org/stable/c/3c0d416eb4bef705f699213cee94bf54b6acdacd git.kernel.org: https://git.kernel.org/stable/c/fdda354f60a576d52dcf90351254714681df4370 git.kernel.org: https://git.kernel.org/stable/c/aaadc0cb05c999ccd8898a03298b7e5c31509b08 git.kernel.org: https://git.kernel.org/stable/c/a3a855764dbacbdb1cc51e15dc588f2d21c93e0e git.kernel.org: https://git.kernel.org/stable/c/4a6921095eb04a900e0000da83d9475eb958e61e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html