CVE-2024-49954

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> static_call: Replace pointless WARN_ON() in static_call_module_notify()<br /> <br /> static_call_module_notify() triggers a WARN_ON(), when memory allocation<br /> fails in __static_call_add_module().<br /> <br /> That&amp;#39;s not really justified, because the failure case must be correctly<br /> handled by the well known call chain and the error code is passed<br /> through to the initiating userspace application.<br /> <br /> A memory allocation fail is not a fatal problem, but the WARN_ON() takes<br /> the machine out when panic_on_warn is set.<br /> <br /> Replace it with a pr_warn().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10 (including) 5.15.168 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.113 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.55 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.14 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.11 (including) 6.11.3 (excluding)