Executive Summary

Informations
Name CVE-2024-46849 First vendor Publication 2024-09-27
Vendor Cve Last vendor Modification 2024-11-08

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ASoC: meson: axg-card: fix 'use-after-free'

Buffer 'card->dai_link' is reallocated in 'meson_card_reallocate_links()', so move 'pad' pointer initialization after this function when memory is already reallocated.

Kasan bug report:

================================================================== BUG: KASAN: slab-use-after-free in axg_card_add_link+0x76c/0x9bc Read of size 8 at addr ffff000000e8b260 by task modprobe/356

CPU: 0 PID: 356 Comm: modprobe Tainted: G O 6.9.12-sdkernel #1 Call trace:
dump_backtrace+0x94/0xec
show_stack+0x18/0x24
dump_stack_lvl+0x78/0x90
print_report+0xfc/0x5c0
kasan_report+0xb8/0xfc
__asan_load8+0x9c/0xb8
axg_card_add_link+0x76c/0x9bc [snd_soc_meson_axg_sound_card]
meson_card_probe+0x344/0x3b8 [snd_soc_meson_card_utils]
platform_probe+0x8c/0xf4
really_probe+0x110/0x39c
__driver_probe_device+0xb8/0x18c
driver_probe_device+0x108/0x1d8
__driver_attach+0xd0/0x25c
bus_for_each_dev+0xe0/0x154
driver_attach+0x34/0x44
bus_add_driver+0x134/0x294
driver_register+0xa8/0x1e8
__platform_driver_register+0x44/0x54
axg_card_pdrv_init+0x20/0x1000 [snd_soc_meson_axg_sound_card]
do_one_initcall+0xdc/0x25c
do_init_module+0x10c/0x334
load_module+0x24c4/0x26cc
init_module_from_file+0xd4/0x128
__arm64_sys_finit_module+0x1f4/0x41c
invoke_syscall+0x60/0x188
el0_svc_common.constprop.0+0x78/0x13c
do_el0_svc+0x30/0x40
el0_svc+0x38/0x78
el0t_64_sync_handler+0x100/0x12c
el0t_64_sync+0x190/0x194

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46849

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3678

Sources (Detail)

https://git.kernel.org/stable/c/4f9a71435953f941969a4f017e2357db62d85a86
https://git.kernel.org/stable/c/5a2cc2bb81399e9ebc72560541137eb04d61dc3d
https://git.kernel.org/stable/c/7d318166bf55e9029d56997c3b134f4ac2ae2607
https://git.kernel.org/stable/c/a33145f494e6cb82f3e018662cc7c4febf271f22
https://git.kernel.org/stable/c/e1a199ec31617242e1a0ea8f312341e682d0c037
https://git.kernel.org/stable/c/e43364f578cdc2f8083abbc0cb743ea55e827c29
https://git.kernel.org/stable/c/fb0530025d502cb79d2b2801b14a9d5261833f1a
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Date Informations
2025-03-29 03:40:51
  • Multiple Updates
2025-03-28 13:45:12
  • Multiple Updates
2025-03-28 03:18:53
  • Multiple Updates
2025-03-19 03:14:13
  • Multiple Updates
2025-03-18 03:27:09
  • Multiple Updates
2025-03-14 03:14:26
  • Multiple Updates
2025-03-06 14:10:58
  • Multiple Updates
2025-02-22 03:24:32
  • Multiple Updates
2025-01-08 03:05:33
  • Multiple Updates
2025-01-07 03:05:06
  • Multiple Updates
2024-12-25 03:03:43
  • Multiple Updates
2024-12-12 03:06:40
  • Multiple Updates
2024-11-23 03:03:36
  • Multiple Updates
2024-11-22 03:01:45
  • Multiple Updates
2024-11-20 03:00:04
  • Multiple Updates
2024-11-13 21:21:59
  • Multiple Updates
2024-11-09 00:28:26
  • Multiple Updates
2024-11-08 21:28:07
  • Multiple Updates
2024-10-26 00:29:02
  • Multiple Updates
2024-10-25 21:29:55
  • Multiple Updates
2024-10-25 00:29:04
  • Multiple Updates
2024-10-24 17:28:10
  • Multiple Updates
2024-10-22 21:28:12
  • Multiple Updates
2024-10-17 21:27:36
  • Multiple Updates
2024-10-02 17:27:30
  • Multiple Updates
2024-09-30 17:27:26
  • Multiple Updates
2024-09-27 17:27:23
  • First insertion