DEBIAN-CVE-2024-56652

Source
https://security-tracker.debian.org/tracker/CVE-2024-56652
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-56652.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-56652
Upstream
Published
2024-12-27T15:15:25Z
Modified
2025-09-19T06:03:37Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: drm/xe/regsr: Remove register pool That pool implementation doesn't really work: if the krealloc happens to move the memory and return another address, the entries in the xarray become invalid, leading to use-after-free later: BUG: KASAN: slab-use-after-free in xeregsrapplymmio+0x570/0x760 [xe] Read of size 4 at addr ffff8881244b2590 by task modprobe/2753 Allocated by task 2753: kasansavestack+0x39/0x70 kasansavetrack+0x14/0x40 kasansaveallocinfo+0x37/0x60 _kasankmalloc+0xc3/0xd0 _kmallocnodetrackcallernoprof+0x200/0x6d0 kreallocnoprof+0x229/0x380 Simplify the code to fix the bug. A better pooling strategy may be added back later if needed. (cherry picked from commit e5283bd4dfecbd3335f43b62a68e24dae23f59e4)

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}