
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-46831 is a use-after-free vulnerability discovered in the Linux kernel's Microchip VCAP driver. The vulnerability specifically affects the VCAP API KUnit test implementation. The issue was identified and reported by Dan Carpenter, with the fix being implemented to address the clear use-after-free error in the test code (Kernel Git).
The vulnerability exists in the Linux kernel's VCAP (Virtual Channel Access Protocol) API test implementation. It involves a use-after-free condition (CWE-416) where memory is accessed after being freed in the KUnit test code. The issue has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access requirements with potential for high impact across confidentiality, integrity, and availability (NVD).
The vulnerability affects Linux kernel versions from 6.2 through 6.6.51, and versions from 6.7 through 6.10.10, including various release candidates of version 6.11. While the vulnerability exists in test code, successful exploitation could potentially lead to system compromise through unauthorized memory access (NVD).
The issue has been resolved by removing the problematic code and implementing a proper return code check for vcap_del_rule. The fix has been merged into the kernel codebase and is available through the patch that removes the use-after-free condition and relies on checking the return code of vcap_del_rule (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."