
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-41058 is a slab-use-after-free vulnerability discovered in the Linux kernel's cachefiles subsystem, specifically in the fscachewithdrawvolume() function. The vulnerability was disclosed on July 29, 2024, affecting Linux kernel versions from 5.17 up to versions before 6.1.101, 6.2 to before 6.6.42, and 6.7 to before 6.9.11 (NVD).
The vulnerability occurs in the cachefiles subsystem when handling volume withdrawals. The issue arises when a fscachevolume object is accessed after being freed, specifically during the execution of fscachewithdraw_volume(). The bug was identified through fault injection stress testing, where a use-after-free condition was detected by KASAN (Kernel Address Sanitizer) when reading a 4-byte value at a freed memory location (Kernel Patch). The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability could allow an attacker with local access to cause a denial of service condition or potentially execute arbitrary code with elevated privileges. The high CVSS score indicates that successful exploitation could lead to complete compromise of confidentiality, integrity, and availability of the affected system (NVD).
The vulnerability has been patched in the Linux kernel. The fix involves using a new fscachetryget_volume() helper function to safely manage the reference counting of volume objects and prevent use-after-free conditions. System administrators should update to kernel versions 6.1.101, 6.6.42, or 6.9.11 or later, depending on their kernel branch (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."