cve/2024/CVE-2024-56764.md
2025-09-29 21:09:30 +02:00

20 lines
1.2 KiB
Markdown

### [CVE-2024-56764](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56764)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=bd23f6c2c2d00518e2f27f2d25cef795de9bee56%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
In the Linux kernel, the following vulnerability has been resolved:ublk: detach gendisk from ublk device if add_disk() failsInside ublk_abort_requests(), gendisk is grabbed for aborting allinflight requests. And ublk_abort_requests() is called when exitingthe uring context or handling timeout.If add_disk() fails, the gendisk may have been freed when callingublk_abort_requests(), so use-after-free can be caused when gettingdisk's reference in ublk_abort_requests().Fixes the bug by detaching gendisk from ublk device if add_disk() fails.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/oogasawa/Utility-security