CVE-2024-50119

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50119
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50119.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-50119
Downstream
Related
Published
2024-11-05T18:15:14Z
Modified
2024-11-16T05:00:05Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

cifs: fix warning when destroy 'cifsiorequest_pool'

There's a issue as follows: WARNING: CPU: 1 PID: 27826 at mm/slub.c:4698 freelargekmalloc+0xac/0xe0 RIP: 0010:freelargekmalloc+0xac/0xe0 Call Trace: <TASK> ? _warn+0xea/0x330 mempooldestroy+0x13f/0x1d0 initcifs+0xa50/0xff0 [cifs] dooneinitcall+0xdc/0x550 doinitmodule+0x22d/0x6b0 loadmodule+0x4e96/0x5ff0 initmodulefromfile+0xcd/0x130 idempotentinitmodule+0x330/0x620 _x64sysfinitmodule+0xb3/0x110 dosyscall64+0xc1/0x1d0 entrySYSCALL64after_hwframe+0x77/0x7f

Obviously, 'cifsiorequestpool' is not created by mempoolcreate(). So just use mempoolexit() to revert 'cifsiorequestpool'.

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}