Executive Summary

Informations
Name CVE-2024-1312 First vendor Publication 2024-02-08
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 4.7
Base Score 4.7 Environmental Score 4.7
impact SubScore 3.6 Temporal Score 4.7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A use-after-free flaw was found in the Linux kernel's Memory Management subsystem when a user wins two races at the same time with a fail in the mas_prev_slot function. This issue could allow a local user to crash the system.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1312

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 1
Os 3623

Sources (Detail)

https://access.redhat.com/security/cve/CVE-2024-1312
https://bugzilla.redhat.com/show_bug.cgi?id=2225569
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/mm/...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
Date Informations
2025-06-26 02:26:57
  • Multiple Updates
2025-06-25 12:28:33
  • Multiple Updates
2025-06-24 02:31:33
  • Multiple Updates
2025-05-27 13:41:38
  • Multiple Updates
2025-05-27 02:31:53
  • Multiple Updates
2025-03-29 03:32:54
  • Multiple Updates
2025-03-28 13:40:20
  • Multiple Updates
2025-03-28 03:12:22
  • Multiple Updates
2025-03-19 03:08:10
  • Multiple Updates
2025-03-18 03:20:49
  • Multiple Updates
2025-03-14 03:08:31
  • Multiple Updates
2025-02-22 03:18:23
  • Multiple Updates
2025-01-08 03:00:53
  • Multiple Updates
2025-01-07 03:00:29
  • Multiple Updates
2024-12-25 02:59:14
  • Multiple Updates
2024-12-18 14:11:27
  • Multiple Updates
2024-12-12 03:02:16
  • Multiple Updates
2024-11-25 09:27:16
  • Multiple Updates
2024-11-21 21:24:55
  • Multiple Updates
2024-11-20 02:56:17
  • Multiple Updates
2024-11-14 02:56:37
  • Multiple Updates
2024-11-09 02:56:38
  • Multiple Updates
2024-10-26 02:54:02
  • Multiple Updates
2024-10-25 02:55:57
  • Multiple Updates
2024-10-23 02:55:13
  • Multiple Updates
2024-10-03 02:50:46
  • Multiple Updates
2024-10-02 02:49:10
  • Multiple Updates
2024-09-15 02:47:06
  • Multiple Updates
2024-09-12 02:46:38
  • Multiple Updates
2024-09-04 02:48:12
  • Multiple Updates
2024-08-22 02:46:16
  • Multiple Updates
2024-08-02 13:55:19
  • Multiple Updates
2024-08-02 01:34:59
  • Multiple Updates
2024-03-12 13:43:49
  • Multiple Updates
2024-02-15 09:27:28
  • Multiple Updates
2024-02-08 17:27:22
  • First insertion