Use After Free Affecting kernel-uek-tools package, versions <0:4.14.35-2047.540.4.1.el7uek


Severity

Recommended
0.0
high
0
10

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ORACLE7-KERNELUEKTOOLS-7678152
  • published14 Aug 2024
  • disclosed19 Jun 2024

Introduced: 19 Jun 2024

CVE-2024-38583  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade Oracle:7 kernel-uek-tools to version 0:4.14.35-2047.540.4.1.el7uek or higher.
This issue was patched in ELSA-2024-12611.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-uek-tools package and not the kernel-uek-tools package as distributed by Oracle. See How to fix? for Oracle:7 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix use-after-free of timer for log writer thread

Patch series "nilfs2: fix log writer related issues".

This bug fix series covers three nilfs2 log writer-related issues, including a timer use-after-free issue and potential deadlock issue on unmount, and a potential freeze issue in event synchronization found during their analysis. Details are described in each commit log.

This patch (of 3):

A use-after-free issue has been reported regarding the timer sc_timer on the nilfs_sc_info structure.

The problem is that even though it is used to wake up a sleeping log writer thread, sc_timer is not shut down until the nilfs_sc_info structure is about to be freed, and is used regardless of the thread's lifetime.

Fix this issue by limiting the use of sc_timer only while the log writer thread is alive.

CVSS Scores

version 3.1