CVE-2024-50165
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/11/2024
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Preserve param->string when parsing mount options<br />
<br />
In bpf_parse_param(), keep the value of param->string intact so it can<br />
be freed later. Otherwise, the kmalloc area pointed to by param->string<br />
will be leaked as shown below:<br />
<br />
unreferenced object 0xffff888118c46d20 (size 8):<br />
comm "new_name", pid 12109, jiffies 4295580214<br />
hex dump (first 8 bytes):<br />
61 6e 79 00 38 c9 5c 7e any.8.\~<br />
backtrace (crc e1b7f876):<br />
[] kmemleak_alloc+0x4b/0x80<br />
[] __kmalloc_node_track_caller_noprof+0x36e/0x4a0<br />
[] memdup_user+0x32/0xa0<br />
[] strndup_user+0x46/0x60<br />
[] __x64_sys_fsconfig+0x368/0x3d0<br />
[] x64_sys_call+0xff/0x9f0<br />
[] do_syscall_64+0x3b/0xc0<br />
[] entry_SYSCALL_64_after_hwframe+0x4b/0x53
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.11.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



