
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-56581 is a use-after-free vulnerability discovered in the Linux kernel's BTRFS filesystem. The vulnerability was disclosed on December 27, 2024, and affects the BTRFS ref-verify functionality. The issue occurs in the btrfsreftreemod() function when handling invalid ref actions, specifically when dealing with BTRFSDROPDELAYEDREF actions (NVD).
The vulnerability stems from a use-after-free condition in the BTRFS filesystem's reference verification code. When btrfsreftreemod() successfully inserts a new ref entry into a block entry's rbtree and encounters an unexpected BTRFSDROPDELAYEDREF action, it frees the ref entry without first removing it from the block entry's rbtree. Subsequently, when btrfsfreeref_cache() is called in the error path, it attempts to access the freed memory while processing the block entries, triggering a use-after-free condition. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability affects multiple versions of the Linux kernel, including versions from 4.15 up to 6.12.4. If exploited, this use-after-free vulnerability could potentially lead to privilege escalation, denial of service, or information disclosure on affected systems (NVD).
The vulnerability has been fixed by adding code to remove the ref entry from the rbtree before freeing it. The fix has been implemented in various kernel versions through patches. Users are advised to update their Linux kernel to a patched version (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."