In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix uninitialized pointer free in add_inode_ref()
The add_inode_ref() function does not initialize the "name" struct when
it is declared. If any of the following calls to "read_one_inode()
returns NULL,
dir = read_one_inode(root, parent_objectid);
if (!dir) {
ret = -ENOENT;
goto out;
}
inode = read_one_inode(root, inode_objectid);
if (!inode) {
ret = -EIO;
goto out;
}
then "name.name" would be freed on "out" before being initialized.
out:
...
kfree(name.name);
This issue was reported by Coverity with CID 1526744.
References
Configurations
Configuration 1 (hide)
|
History
01 Nov 2024, 16:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux
Linux linux Kernel |
|
CWE | CWE-824 | |
CPE | cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/12cf028381aa19bc38465341512c280256e8d82d - Patch | |
References | () https://git.kernel.org/stable/c/66691c6e2f18d2aa4b22ffb624b9bdc97e9979e4 - Patch | |
References | () https://git.kernel.org/stable/c/a941f3d5b1469c60a7e70e775584f110b47e0d16 - Patch | |
References | () https://git.kernel.org/stable/c/e11ce03b58743bf1e096c48fcaa7e6f08eb75dfa - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
29 Oct 2024, 14:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Oct 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-29 01:15
Updated : 2024-11-01 16:05
NVD link : CVE-2024-50088
Mitre link : CVE-2024-50088
CVE.ORG link : CVE-2024-50088
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-824
Access of Uninitialized Pointer