CVE-2024-49936
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-49936 is a Use-After-Free (UAF) vulnerability discovered in the Linux kernel's Xen netback driver, specifically in the xenvif_flush_hash() function. The vulnerability was identified on October 21, 2024, affecting multiple versions of the Linux kernel up to versions 5.10.227, 5.15.168, 6.1.113, 6.6.55, and 6.11.3. The issue occurs in the net/xen-netback subsystem where improper handling of RCU (Read-Copy-Update) operations could lead to memory safety violations (NVD).

Technical details

The vulnerability stems from a race condition in the xenvif_flush_hash() function where kfree_rcu is called outside the RCU read critical section. During the list_for_each_entry_rcu iteration, if kfree_rcu is called when the RCU grace period ends during iteration, a Use-After-Free condition occurs when accessing head->next after the entry becomes free. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High), with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access requirements but high potential impact (NVD).

Impact

The vulnerability could potentially lead to privilege escalation, information disclosure, or system crashes due to the Use-After-Free condition in the kernel's network stack. The high CVSS score reflects the potential for complete compromise of system confidentiality, integrity, and availability if successfully exploited (NVD).

Mitigation and workarounds

The vulnerability has been patched by changing the list iteration method from list_for_each_entry_rcu to list_for_each_entry_safe. Multiple Linux distributions have released fixes, including Ubuntu for versions 24.10, 24.04 LTS, and 22.04 LTS. The fix involves modifying the xenvif_flush_hash() function to properly handle the RCU operations (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • linux-gcp
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-core
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-uki-virt
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • kernel-modules-extra
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management