SB2024123034 - Use-after-free in Linux kernel include asm
Published: December 30, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2024-56677)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the setup_arch() function in arch/powerpc/kernel/setup-common.c, within the fadump_cma_init() and fadump_reserve_mem() functions in arch/powerpc/kernel/fadump.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/05b94cae1c47f94588c3e7096963c1007c4d9c1d
- https://git.kernel.org/stable/c/7351c5a6507b4401aeecadb5959131410a339520
- https://git.kernel.org/stable/c/aabef6301dcf410dfd2b8759cd413b2a003c7e3f
- https://git.kernel.org/stable/c/c5c1d1ef70834013fc3bd12b6a0f4664c6d75a74
- https://git.kernel.org/stable/c/f551637fe9bf863386309e03f9d148d97f535ad1
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11.11