CVE-2024-50119
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/11/2024
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cifs: fix warning when destroy &#39;cifs_io_request_pool&#39;<br />
<br />
There&#39;s a issue as follows:<br />
WARNING: CPU: 1 PID: 27826 at mm/slub.c:4698 free_large_kmalloc+0xac/0xe0<br />
RIP: 0010:free_large_kmalloc+0xac/0xe0<br />
Call Trace:<br />
<br />
? __warn+0xea/0x330<br />
mempool_destroy+0x13f/0x1d0<br />
init_cifs+0xa50/0xff0 [cifs]<br />
do_one_initcall+0xdc/0x550<br />
do_init_module+0x22d/0x6b0<br />
load_module+0x4e96/0x5ff0<br />
init_module_from_file+0xcd/0x130<br />
idempotent_init_module+0x330/0x620<br />
__x64_sys_finit_module+0xb3/0x110<br />
do_syscall_64+0xc1/0x1d0<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
<br />
Obviously, &#39;cifs_io_request_pool&#39; is not created by mempool_create().<br />
So just use mempool_exit() to revert &#39;cifs_io_request_pool&#39;.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.10 (including) | 6.11.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



