CVE-2024-47675

Source
https://cve.org/CVERecord?id=CVE-2024-47675
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47675.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47675
Downstream
Related
Published
2024-10-21T11:53:19.762Z
Modified
2026-03-20T12:38:02.204599Z
Summary
bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix use-after-free in bpfuprobemultilinkattach()

If bpflinkprime() fails, bpfuprobemultilinkattach() goes to the errorfree label and frees the array of bpfuprobe's without calling bpfuprobeunregister().

This leaks bpfuprobe->uprobe and worse, this frees bpfuprobe->consumer without removing it from the uprobe->consumers list.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47675.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
89ae89f53d201143560f1e9ed4bfa62eee34f88e
Fixed
790c630ab0e7d7aba6d186581d4627c09fce60f3
Fixed
7c1d782e5afbf7c50ba74ecc4ddc18a05d63e5ee
Fixed
cdf27834c3dd5d9abf7eb8e4ee87ee9e307eb25c
Fixed
5fe6e308abaea082c20fbf2aa5df8e14495622cf

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47675.json"