CVE-2024-50231

In the Linux kernel, the following vulnerability has been resolved: iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() modprobe iio-test-gts and rmmod it, then the following memory leak occurs: unreferenced object 0xffffff80c810be00 (size 64): comm "kunit_try_catch", pid 1654, jiffies 4294913981 hex dump (first 32 bytes): 02 00 00 00 08 00 00 00 20 00 00 00 40 00 00 00 ........ ...@... 80 00 00 00 00 02 00 00 00 04 00 00 00 08 00 00 ................ backtrace (crc a63d875e): [<0000000028c1b3c2>] kmemleak_alloc+0x34/0x40 [<000000001d6ecc87>] __kmalloc_noprof+0x2bc/0x3c0 [<00000000393795c1>] devm_iio_init_iio_gts+0x4b4/0x16f4 [<0000000071bb4b09>] 0xffffffdf052a62e0 [<000000000315bc18>] 0xffffffdf052a6488 [<00000000f9dc55b5>] kunit_try_run_case+0x13c/0x3ac [<00000000175a3fd4>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000f505065d>] kthread+0x2e8/0x374 [<00000000bbfb0e5d>] ret_from_fork+0x10/0x20 unreferenced object 0xffffff80cbfe9e70 (size 16): comm "kunit_try_catch", pid 1658, jiffies 4294914015 hex dump (first 16 bytes): 10 00 00 00 40 00 00 00 80 00 00 00 00 00 00 00 ....@........... backtrace (crc 857f0cb4): [<0000000028c1b3c2>] kmemleak_alloc+0x34/0x40 [<000000001d6ecc87>] __kmalloc_noprof+0x2bc/0x3c0 [<00000000393795c1>] devm_iio_init_iio_gts+0x4b4/0x16f4 [<0000000071bb4b09>] 0xffffffdf052a62e0 [<000000007d089d45>] 0xffffffdf052a6864 [<00000000f9dc55b5>] kunit_try_run_case+0x13c/0x3ac [<00000000175a3fd4>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000f505065d>] kthread+0x2e8/0x374 [<00000000bbfb0e5d>] ret_from_fork+0x10/0x20 ...... It includes 5*5 times "size 64" memory leaks, which correspond to 5 times test_init_iio_gain_scale() calls with gts_test_gains size 10 (10*size(int)) and gts_test_itimes size 5. It also includes 5*1 times "size 16" memory leak, which correspond to one time __test_init_iio_gain_scale() call with gts_test_gains_gain_low size 3 (3*size(int)) and gts_test_itimes size 5. The reason is that the per_time_gains[i] is not freed which is allocated in the "gts->num_itime" for loop in iio_gts_build_avail_scale_table().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*

History

13 Nov 2024, 18:30

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/16e41593825c3044efca0eb34b2d6ffba306e4ec - () https://git.kernel.org/stable/c/16e41593825c3044efca0eb34b2d6ffba306e4ec - Patch
References () https://git.kernel.org/stable/c/38d6e8be234d87b0eedca50309e25051888b39d1 - () https://git.kernel.org/stable/c/38d6e8be234d87b0eedca50309e25051888b39d1 - Patch
References () https://git.kernel.org/stable/c/691e79ffc42154a9c91dc3b7e96a307037b4be74 - () https://git.kernel.org/stable/c/691e79ffc42154a9c91dc3b7e96a307037b4be74 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE CWE-401

12 Nov 2024, 13:56

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: gts-helper: corrige fugas de memoria en iio_gts_build_avail_scale_table() modprobe iio-test-gts y rmmod, luego ocurre la siguiente fuga de memoria: objeto sin referencia 0xffffff80c810be00 (tamaño 64): comm "kunit_try_catch", pid 1654, jiffies 4294913981 volcado hexadecimal (primeros 32 bytes): 02 00 00 00 08 00 00 00 20 00 00 00 40 00 00 00 ........ ...@... 80 00 00 00 00 02 00 00 00 04 00 00 00 08 00 00 ................ backtrace (crc a63d875e): [&lt;0000000028c1b3c2&gt;] kmemleak_alloc+0x34/0x40 [&lt;000000001d6ecc87&gt;] __kmalloc_noprof+0x2bc/0x3c0 [&lt;00000000393795c1&gt;] devm_iio_init_iio_gts+0x4b4/0x16f4 [&lt;0000000071bb4b09&gt;] 0xffffffdf052a62e0 [&lt;000000000315bc18&gt;] 0xffffffdf052a6488 [&lt;00000000f9dc55b5&gt;] kunit_try_run_case+0x13c/0x3ac [&lt;00000000175a3fd4&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [&lt;00000000f505065d&gt;] kthread+0x2e8/0x374 [&lt;00000000bbfb0e5d&gt;] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80cbfe9e70 (tamaño 16): comm "kunit_try_catch", pid 1658, jiffies 4294914015 volcado hexadecimal (primeros 16 bytes): 10 00 00 00 40 00 00 00 80 00 00 00 00 00 00 00 ....@........... backtrace (crc 857f0cb4): [&lt;0000000028c1b3c2&gt;] kmemleak_alloc+0x34/0x40 [&lt;000000001d6ecc87&gt;] __kmalloc_noprof+0x2bc/0x3c0 [&lt;00000000393795c1&gt;] devm_iio_init_iio_gts+0x4b4/0x16f4 [&lt;0000000071bb4b09&gt;] 0xffffffdf052a62e0 [&lt;000000007d089d45&gt;] 0xffffffdf052a6864 [&lt;00000000f9dc55b5&gt;] kunit_try_run_case+0x13c/0x3ac [&lt;00000000175a3fd4&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [&lt;00000000f505065d&gt;] kthread+0x2e8/0x374 [&lt;00000000bbfb0e5d&gt;] ret_from_fork+0x10/0x20 ...... Incluye 5*5 veces pérdidas de memoria de "tamaño 64", que corresponden a 5 veces llamadas a test_init_iio_gain_scale() con gts_test_gains tamaño 10 (10*size(int)) y gts_test_itimes tamaño 5. También incluye 5*1 veces pérdidas de memoria de "tamaño 16", que corresponden a una vez llamada a __test_init_iio_gain_scale() con gts_test_gains_gain_low tamaño 3 (3*size(int)) y gts_test_itimes tamaño 5. La razón es que no se libera per_time_gains[i], que está asignado en el bucle for "gts-&gt;num_itime" en iio_gts_build_avail_scale_table().

09 Nov 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-09 11:15

Updated : 2024-11-13 18:30


NVD link : CVE-2024-50231

Mitre link : CVE-2024-50231

CVE.ORG link : CVE-2024-50231


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime