CVE-2024-50165

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50165
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50165.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-50165
Downstream
Related
Published
2024-11-07T10:15:07Z
Modified
2024-11-22T16:53:05Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Preserve param->string when parsing mount options

In bpfparseparam(), keep the value of param->string intact so it can be freed later. Otherwise, the kmalloc area pointed to by param->string will be leaked as shown below:

unreferenced object 0xffff888118c46d20 (size 8): comm "newname", pid 12109, jiffies 4295580214 hex dump (first 8 bytes): 61 6e 79 00 38 c9 5c 7e any.8.\~ backtrace (crc e1b7f876): [<00000000c6848ac7>] kmemleakalloc+0x4b/0x80 [<00000000de9f7d00>] _kmallocnodetrackcallernoprof+0x36e/0x4a0 [<000000003e29b886>] memdupuser+0x32/0xa0 [<0000000007248326>] strndupuser+0x46/0x60 [<0000000035b3dd29>] _x64sysfsconfig+0x368/0x3d0 [<0000000018657927>] x64syscall+0xff/0x9f0 [<00000000c0cabc95>] dosyscall64+0x3b/0xc0 [<000000002f331597>] entrySYSCALL64afterhwframe+0x4b/0x53

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}