CVE-2024-50215

In the Linux kernel, the following vulnerability has been resolved: nvmet-auth: assign dh_key to NULL after kfree_sensitive ctrl->dh_key might be used across multiple calls to nvmet_setup_dhgroup() for the same controller. So it's better to nullify it after release on error path in order to avoid double free later in nvmet_destroy_auth(). Found by Linux Verification Center (linuxtesting.org) with Svace.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*

History

13 Nov 2024, 17:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-415
References () https://git.kernel.org/stable/c/c60af16e1d6cc2237d58336546d6adfc067b6b8f - () https://git.kernel.org/stable/c/c60af16e1d6cc2237d58336546d6adfc067b6b8f - Patch
References () https://git.kernel.org/stable/c/c94e965f766321641ec38e4eece9ce8884543244 - () https://git.kernel.org/stable/c/c94e965f766321641ec38e4eece9ce8884543244 - Patch
References () https://git.kernel.org/stable/c/d2f551b1f72b4c508ab9298419f6feadc3b5d791 - () https://git.kernel.org/stable/c/d2f551b1f72b4c508ab9298419f6feadc3b5d791 - Patch
References () https://git.kernel.org/stable/c/e61bd51e44409495d75847e9230736593e4c8710 - () https://git.kernel.org/stable/c/e61bd51e44409495d75847e9230736593e4c8710 - Patch
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*

12 Nov 2024, 13:56

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet-auth: asignar dh_key a NULL después de que kfree_sensitive ctrl->dh_key se pudiera usar en varias llamadas a nvmet_setup_dhgroup() para el mismo controlador. Por lo tanto, es mejor anularlo después de la liberación en la ruta de error para evitar una doble liberación más adelante en nvmet_destroy_auth(). Encontrado por Linux Verification Center (linuxtesting.org) con Svace.

09 Nov 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-09 11:15

Updated : 2024-11-13 17:35


NVD link : CVE-2024-50215

Mitre link : CVE-2024-50215

CVE.ORG link : CVE-2024-50215


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free