U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

NOTICE UPDATED - May, 29th 2024

The NVD has a new announcement page with status updates, news, and how to stay connected!

CVE-2024-39292 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winch IRQ is racy, an interrupt may occur before the winch is added to the winch_handlers list. If that happens, register_winch_irq() adds to that list a winch that is scheduled to be (or has already been) freed, causing a panic later in winch_cleanup(). Avoid the race by adding the winch to the winch_handlers list before registering the IRQ, and rolling back if um_request_irq() fails.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0c02d425a2fbe52643a5859a779db0329e7dddd4 Mailing List  Patch 
https://git.kernel.org/stable/c/31960d991e43c8d6dc07245f19fc13398e90ead2 Mailing List  Patch 
https://git.kernel.org/stable/c/351d1a64544944b44732f6a64ed65573b00b9e14 Mailing List  Patch 
https://git.kernel.org/stable/c/434a06c38ee1217a8baa0dd7c37cc85d50138fb0 Mailing List  Patch 
https://git.kernel.org/stable/c/66ea9a7c6824821476914bed21a476cd20094f33 Mailing List  Patch 
https://git.kernel.org/stable/c/73b8e21f76c7dda4905655d2e2c17dc5a73b87f1 Mailing List  Patch 
https://git.kernel.org/stable/c/a0fbbd36c156b9f7b2276871d499c9943dfe5101 Mailing List  Patch 
https://git.kernel.org/stable/c/dc1ff95602ee908fcd7d8acee7a0dadb61b1a0c0 Mailing List  Patch 
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Weakness Enumeration

CWE-ID CWE Name Source
CWE-415 Double Free cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-39292
NVD Published Date:
06/24/2024
NVD Last Modified:
06/27/2024
Source:
kernel.org