
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a use-after-free vulnerability was discovered in the daxmappingrelease() function. The issue occurs when removing a device-dax region provider, where an ida object is attempted to be freed after it has already been freed. This vulnerability was identified through CONFIGDEBUGKOBJECT_RELEASE testing.
The vulnerability manifests when attempting idafree() on an already freed ida object during daxmappingrelease(). The issue is triggered when a device-dax region provider (like modprobe -r daxhmem) is removed. The root cause is that devices typically only hold a reference on their parent while registered, but if a child needs a parent object to complete its release, it needs to hold a reference that it drops from its release callback. The bug results in an invalid free operation that triggers kernel warnings and potential system instability (Tenable).
This vulnerability could lead to system instability and potential crashes when removing device-dax region providers. The issue affects the kernel's memory management subsystem and could potentially be exploited to cause denial of service conditions.
The fix involves arranging for a daxmapping to pin its parent devdax instance until daxmappingrelease(). This ensures proper reference counting and prevents the use-after-free condition (Tenable).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."