CVE-2024-53049
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/11/2024
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
slub/kunit: fix a WARNING due to unwrapped __kmalloc_cache_noprof<br />
<br />
&#39;modprobe slub_kunit&#39; will have a warning as shown below. The root cause<br />
is that __kmalloc_cache_noprof was directly used, which resulted in no<br />
alloc_tag being allocated. This caused current->alloc_tag to be null,<br />
leading to a warning in alloc_tag_add_check.<br />
<br />
Let&#39;s add an alloc_hook layer to __kmalloc_cache_noprof specifically<br />
within lib/slub_kunit.c, which is the only user of this internal slub<br />
function outside kmalloc implementation itself.<br />
<br />
[58162.947016] WARNING: CPU: 2 PID: 6210 at<br />
./include/linux/alloc_tag.h:125 alloc_tagging_slab_alloc_hook+0x268/0x27c<br />
[58162.957721] Call trace:<br />
[58162.957919] alloc_tagging_slab_alloc_hook+0x268/0x27c<br />
[58162.958286] __kmalloc_cache_noprof+0x14c/0x344<br />
[58162.958615] test_kmalloc_redzone_access+0x50/0x10c [slub_kunit]<br />
[58162.959045] kunit_try_run_case+0x74/0x184 [kunit]<br />
[58162.959401] kunit_generic_run_threadfn_adapter+0x2c/0x4c [kunit]<br />
[58162.959841] kthread+0x10c/0x118<br />
[58162.960093] ret_from_fork+0x10/0x20<br />
[58162.960363] ---[ end trace 0000000000000000 ]---
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



