#VU102070 Use-after-free in Linux kernel - CVE-2024-53239


| Updated: 2025-05-12

Vulnerability identifier: #VU102070

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53239

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the usb6fire_chip_abort(), usb6fire_chip_destroy(), usb6fire_chip_probe() and usb6fire_chip_disconnect() functions in sound/usb/6fire/chip.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 5.10 - 5.10.230


External links
https://git.kernel.org/stable/c/0df7f4b5cc10f5adf98be0845372e9eef7bb5b09
https://git.kernel.org/stable/c/273eec23467dfbfbd0e4c10302579ba441fb1e13
https://git.kernel.org/stable/c/57860a80f03f9dc69a34a5c37b0941ad032a0a8c
https://git.kernel.org/stable/c/74357d0b5cd3ef544752bc9f21cbeee4902fae6c
https://git.kernel.org/stable/c/a0810c3d6dd2d29a9b92604d682eacd2902ce947
https://git.kernel.org/stable/c/b754e831a94f82f2593af806741392903f359168
https://git.kernel.org/stable/c/b889a7d68d7e76b8795b754a75c91a2d561d5e8c
https://git.kernel.org/stable/c/ea8cc56db659cf0ae57073e32a4735ead7bd7ee3
https://git.kernel.org/stable/c/f2d06d4e129e2508e356136f99bb20a332ff1a00
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.231


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability