cve-2024-50084
Vulnerability from cvelistv5
Published
2024-10-29 00:50
Modified
2024-12-19 09:32
Summary
In the Linux kernel, the following vulnerability has been resolved: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() Commit a3c1e45156ad ("net: microchip: vcap: Fix use-after-free error in kunit test") fixed the use-after-free error, but introduced below memory leaks by removing necessary vcap_free_rule(), add it to fix it. unreferenced object 0xffffff80ca58b700 (size 192): comm "kunit_try_catch", pid 1215, jiffies 4294898264 hex dump (first 32 bytes): 00 12 7a 00 05 00 00 00 0a 00 00 00 64 00 00 00 ..z.........d... 00 00 00 00 00 00 00 00 00 04 0b cc 80 ff ff ff ................ backtrace (crc 9c09c3fe): [<0000000052a0be73>] kmemleak_alloc+0x34/0x40 [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4 [<0000000040a01b8d>] vcap_alloc_rule+0x3cc/0x9c4 [<000000003fe86110>] vcap_api_encode_rule_test+0x1ac/0x16b0 [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000c5d82c9a>] kthread+0x2e8/0x374 [<00000000f4287308>] ret_from_fork+0x10/0x20 unreferenced object 0xffffff80cc0b0400 (size 64): comm "kunit_try_catch", pid 1215, jiffies 4294898265 hex dump (first 32 bytes): 80 04 0b cc 80 ff ff ff 18 b7 58 ca 80 ff ff ff ..........X..... 39 00 00 00 02 00 00 00 06 05 04 03 02 01 ff ff 9............... backtrace (crc daf014e9): [<0000000052a0be73>] kmemleak_alloc+0x34/0x40 [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4 [<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528 [<00000000dfdb1e81>] vcap_api_encode_rule_test+0x224/0x16b0 [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000c5d82c9a>] kthread+0x2e8/0x374 [<00000000f4287308>] ret_from_fork+0x10/0x20 unreferenced object 0xffffff80cc0b0700 (size 64): comm "kunit_try_catch", pid 1215, jiffies 4294898265 hex dump (first 32 bytes): 80 07 0b cc 80 ff ff ff 28 b7 58 ca 80 ff ff ff ........(.X..... 3c 00 00 00 00 00 00 00 01 2f 03 b3 ec ff ff ff <......../...... backtrace (crc 8d877792): [<0000000052a0be73>] kmemleak_alloc+0x34/0x40 [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4 [<000000006eadfab7>] vcap_rule_add_action+0x2d0/0x52c [<00000000323475d1>] vcap_api_encode_rule_test+0x4d4/0x16b0 [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000c5d82c9a>] kthread+0x2e8/0x374 [<00000000f4287308>] ret_from_fork+0x10/0x20 unreferenced object 0xffffff80cc0b0900 (size 64): comm "kunit_try_catch", pid 1215, jiffies 4294898266 hex dump (first 32 bytes): 80 09 0b cc 80 ff ff ff 80 06 0b cc 80 ff ff ff ................ 7d 00 00 00 01 00 00 00 00 00 00 00 ff 00 00 00 }............... backtrace (crc 34181e56): [<0000000052a0be73>] kmemleak_alloc+0x34/0x40 [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4 [<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528 [<00000000991e3564>] vcap_val_rule+0xcf0/0x13e8 [<00000000fc9868e5>] vcap_api_encode_rule_test+0x678/0x16b0 [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000c5d82c9a>] kthread+0x2e8/0x374 [<00000000f4287308>] ret_from_fork+0x10/0x20 unreferenced object 0xffffff80cc0b0980 (size 64): comm "kunit_try_catch", pid 1215, jiffies 4294898266 hex dump (first 32 bytes): 18 b7 58 ca 80 ff ff ff 00 09 0b cc 80 ff ff ff ..X............. 67 00 00 00 00 00 00 00 01 01 74 88 c0 ff ff ff g.........t..... backtrace (crc 275fd9be): [<0000000052a0be73>] kmemleak_alloc+0x34/0x40 [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4 [<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528 [<000000001396a1a2>] test_add_de ---truncated---
Impacted products
Vendor Product Version
Linux Linux Version: 6.11
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-50084",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-11T14:49:03.899652Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-416",
                "description": "CWE-416 Use After Free",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-11T14:58:34.572Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/microchip/vcap/vcap_api_kunit.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "20b5342de51bda794791e013b90754774003a515",
              "status": "affected",
              "version": "b0804c286ccfcf5f5c004d5bf8a54c0508b5e86b",
              "versionType": "git"
            },
            {
              "lessThan": "170792097bb21e5da77443b6a03d35489813eabe",
              "status": "affected",
              "version": "a3c1e45156ad39f225cd7ddae0f81230a3b1e657",
              "versionType": "git"
            },
            {
              "lessThan": "217a3d98d1e9891a8b1438a27dfbc64ddf01f691",
              "status": "affected",
              "version": "a3c1e45156ad39f225cd7ddae0f81230a3b1e657",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/microchip/vcap/vcap_api_kunit.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.11"
            },
            {
              "lessThan": "6.11",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.58",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.12",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()\n\nCommit a3c1e45156ad (\"net: microchip: vcap: Fix use-after-free error in\nkunit test\") fixed the use-after-free error, but introduced below\nmemory leaks by removing necessary vcap_free_rule(), add it to fix it.\n\n\tunreferenced object 0xffffff80ca58b700 (size 192):\n\t  comm \"kunit_try_catch\", pid 1215, jiffies 4294898264\n\t  hex dump (first 32 bytes):\n\t    00 12 7a 00 05 00 00 00 0a 00 00 00 64 00 00 00  ..z.........d...\n\t    00 00 00 00 00 00 00 00 00 04 0b cc 80 ff ff ff  ................\n\t  backtrace (crc 9c09c3fe):\n\t    [\u003c0000000052a0be73\u003e] kmemleak_alloc+0x34/0x40\n\t    [\u003c0000000043605459\u003e] __kmalloc_cache_noprof+0x26c/0x2f4\n\t    [\u003c0000000040a01b8d\u003e] vcap_alloc_rule+0x3cc/0x9c4\n\t    [\u003c000000003fe86110\u003e] vcap_api_encode_rule_test+0x1ac/0x16b0\n\t    [\u003c00000000b3595fc4\u003e] kunit_try_run_case+0x13c/0x3ac\n\t    [\u003c0000000010f5d2bf\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t    [\u003c00000000c5d82c9a\u003e] kthread+0x2e8/0x374\n\t    [\u003c00000000f4287308\u003e] ret_from_fork+0x10/0x20\n\tunreferenced object 0xffffff80cc0b0400 (size 64):\n\t  comm \"kunit_try_catch\", pid 1215, jiffies 4294898265\n\t  hex dump (first 32 bytes):\n\t    80 04 0b cc 80 ff ff ff 18 b7 58 ca 80 ff ff ff  ..........X.....\n\t    39 00 00 00 02 00 00 00 06 05 04 03 02 01 ff ff  9...............\n\t  backtrace (crc daf014e9):\n\t    [\u003c0000000052a0be73\u003e] kmemleak_alloc+0x34/0x40\n\t    [\u003c0000000043605459\u003e] __kmalloc_cache_noprof+0x26c/0x2f4\n\t    [\u003c000000000ff63fd4\u003e] vcap_rule_add_key+0x2cc/0x528\n\t    [\u003c00000000dfdb1e81\u003e] vcap_api_encode_rule_test+0x224/0x16b0\n\t    [\u003c00000000b3595fc4\u003e] kunit_try_run_case+0x13c/0x3ac\n\t    [\u003c0000000010f5d2bf\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t    [\u003c00000000c5d82c9a\u003e] kthread+0x2e8/0x374\n\t    [\u003c00000000f4287308\u003e] ret_from_fork+0x10/0x20\n\tunreferenced object 0xffffff80cc0b0700 (size 64):\n\t  comm \"kunit_try_catch\", pid 1215, jiffies 4294898265\n\t  hex dump (first 32 bytes):\n\t    80 07 0b cc 80 ff ff ff 28 b7 58 ca 80 ff ff ff  ........(.X.....\n\t    3c 00 00 00 00 00 00 00 01 2f 03 b3 ec ff ff ff  \u003c......../......\n\t  backtrace (crc 8d877792):\n\t    [\u003c0000000052a0be73\u003e] kmemleak_alloc+0x34/0x40\n\t    [\u003c0000000043605459\u003e] __kmalloc_cache_noprof+0x26c/0x2f4\n\t    [\u003c000000006eadfab7\u003e] vcap_rule_add_action+0x2d0/0x52c\n\t    [\u003c00000000323475d1\u003e] vcap_api_encode_rule_test+0x4d4/0x16b0\n\t    [\u003c00000000b3595fc4\u003e] kunit_try_run_case+0x13c/0x3ac\n\t    [\u003c0000000010f5d2bf\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t    [\u003c00000000c5d82c9a\u003e] kthread+0x2e8/0x374\n\t    [\u003c00000000f4287308\u003e] ret_from_fork+0x10/0x20\n\tunreferenced object 0xffffff80cc0b0900 (size 64):\n\t  comm \"kunit_try_catch\", pid 1215, jiffies 4294898266\n\t  hex dump (first 32 bytes):\n\t    80 09 0b cc 80 ff ff ff 80 06 0b cc 80 ff ff ff  ................\n\t    7d 00 00 00 01 00 00 00 00 00 00 00 ff 00 00 00  }...............\n\t  backtrace (crc 34181e56):\n\t    [\u003c0000000052a0be73\u003e] kmemleak_alloc+0x34/0x40\n\t    [\u003c0000000043605459\u003e] __kmalloc_cache_noprof+0x26c/0x2f4\n\t    [\u003c000000000ff63fd4\u003e] vcap_rule_add_key+0x2cc/0x528\n\t    [\u003c00000000991e3564\u003e] vcap_val_rule+0xcf0/0x13e8\n\t    [\u003c00000000fc9868e5\u003e] vcap_api_encode_rule_test+0x678/0x16b0\n\t    [\u003c00000000b3595fc4\u003e] kunit_try_run_case+0x13c/0x3ac\n\t    [\u003c0000000010f5d2bf\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t    [\u003c00000000c5d82c9a\u003e] kthread+0x2e8/0x374\n\t    [\u003c00000000f4287308\u003e] ret_from_fork+0x10/0x20\n\tunreferenced object 0xffffff80cc0b0980 (size 64):\n\t  comm \"kunit_try_catch\", pid 1215, jiffies 4294898266\n\t  hex dump (first 32 bytes):\n\t    18 b7 58 ca 80 ff ff ff 00 09 0b cc 80 ff ff ff  ..X.............\n\t    67 00 00 00 00 00 00 00 01 01 74 88 c0 ff ff ff  g.........t.....\n\t  backtrace (crc 275fd9be):\n\t    [\u003c0000000052a0be73\u003e] kmemleak_alloc+0x34/0x40\n\t    [\u003c0000000043605459\u003e] __kmalloc_cache_noprof+0x26c/0x2f4\n\t    [\u003c000000000ff63fd4\u003e] vcap_rule_add_key+0x2cc/0x528\n\t    [\u003c000000001396a1a2\u003e] test_add_de\n---truncated---"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:32:42.267Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/20b5342de51bda794791e013b90754774003a515"
        },
        {
          "url": "https://git.kernel.org/stable/c/170792097bb21e5da77443b6a03d35489813eabe"
        },
        {
          "url": "https://git.kernel.org/stable/c/217a3d98d1e9891a8b1438a27dfbc64ddf01f691"
        }
      ],
      "title": "net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-50084",
    "datePublished": "2024-10-29T00:50:27.226Z",
    "dateReserved": "2024-10-21T19:36:19.942Z",
    "dateUpdated": "2024-12-19T09:32:42.267Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-50084\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-29T01:15:05.327\",\"lastModified\":\"2024-12-11T15:15:11.340\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()\\n\\nCommit a3c1e45156ad (\\\"net: microchip: vcap: Fix use-after-free error in\\nkunit test\\\") fixed the use-after-free error, but introduced below\\nmemory leaks by removing necessary vcap_free_rule(), add it to fix it.\\n\\n\\tunreferenced object 0xffffff80ca58b700 (size 192):\\n\\t  comm \\\"kunit_try_catch\\\", pid 1215, jiffies 4294898264\\n\\t  hex dump (first 32 bytes):\\n\\t    00 12 7a 00 05 00 00 00 0a 00 00 00 64 00 00 00  ..z.........d...\\n\\t    00 00 00 00 00 00 00 00 00 04 0b cc 80 ff ff ff  ................\\n\\t  backtrace (crc 9c09c3fe):\\n\\t    [\u003c0000000052a0be73\u003e] kmemleak_alloc+0x34/0x40\\n\\t    [\u003c0000000043605459\u003e] __kmalloc_cache_noprof+0x26c/0x2f4\\n\\t    [\u003c0000000040a01b8d\u003e] vcap_alloc_rule+0x3cc/0x9c4\\n\\t    [\u003c000000003fe86110\u003e] vcap_api_encode_rule_test+0x1ac/0x16b0\\n\\t    [\u003c00000000b3595fc4\u003e] kunit_try_run_case+0x13c/0x3ac\\n\\t    [\u003c0000000010f5d2bf\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\\n\\t    [\u003c00000000c5d82c9a\u003e] kthread+0x2e8/0x374\\n\\t    [\u003c00000000f4287308\u003e] ret_from_fork+0x10/0x20\\n\\tunreferenced object 0xffffff80cc0b0400 (size 64):\\n\\t  comm \\\"kunit_try_catch\\\", pid 1215, jiffies 4294898265\\n\\t  hex dump (first 32 bytes):\\n\\t    80 04 0b cc 80 ff ff ff 18 b7 58 ca 80 ff ff ff  ..........X.....\\n\\t    39 00 00 00 02 00 00 00 06 05 04 03 02 01 ff ff  9...............\\n\\t  backtrace (crc daf014e9):\\n\\t    [\u003c0000000052a0be73\u003e] kmemleak_alloc+0x34/0x40\\n\\t    [\u003c0000000043605459\u003e] __kmalloc_cache_noprof+0x26c/0x2f4\\n\\t    [\u003c000000000ff63fd4\u003e] vcap_rule_add_key+0x2cc/0x528\\n\\t    [\u003c00000000dfdb1e81\u003e] vcap_api_encode_rule_test+0x224/0x16b0\\n\\t    [\u003c00000000b3595fc4\u003e] kunit_try_run_case+0x13c/0x3ac\\n\\t    [\u003c0000000010f5d2bf\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\\n\\t    [\u003c00000000c5d82c9a\u003e] kthread+0x2e8/0x374\\n\\t    [\u003c00000000f4287308\u003e] ret_from_fork+0x10/0x20\\n\\tunreferenced object 0xffffff80cc0b0700 (size 64):\\n\\t  comm \\\"kunit_try_catch\\\", pid 1215, jiffies 4294898265\\n\\t  hex dump (first 32 bytes):\\n\\t    80 07 0b cc 80 ff ff ff 28 b7 58 ca 80 ff ff ff  ........(.X.....\\n\\t    3c 00 00 00 00 00 00 00 01 2f 03 b3 ec ff ff ff  \u003c......../......\\n\\t  backtrace (crc 8d877792):\\n\\t    [\u003c0000000052a0be73\u003e] kmemleak_alloc+0x34/0x40\\n\\t    [\u003c0000000043605459\u003e] __kmalloc_cache_noprof+0x26c/0x2f4\\n\\t    [\u003c000000006eadfab7\u003e] vcap_rule_add_action+0x2d0/0x52c\\n\\t    [\u003c00000000323475d1\u003e] vcap_api_encode_rule_test+0x4d4/0x16b0\\n\\t    [\u003c00000000b3595fc4\u003e] kunit_try_run_case+0x13c/0x3ac\\n\\t    [\u003c0000000010f5d2bf\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\\n\\t    [\u003c00000000c5d82c9a\u003e] kthread+0x2e8/0x374\\n\\t    [\u003c00000000f4287308\u003e] ret_from_fork+0x10/0x20\\n\\tunreferenced object 0xffffff80cc0b0900 (size 64):\\n\\t  comm \\\"kunit_try_catch\\\", pid 1215, jiffies 4294898266\\n\\t  hex dump (first 32 bytes):\\n\\t    80 09 0b cc 80 ff ff ff 80 06 0b cc 80 ff ff ff  ................\\n\\t    7d 00 00 00 01 00 00 00 00 00 00 00 ff 00 00 00  }...............\\n\\t  backtrace (crc 34181e56):\\n\\t    [\u003c0000000052a0be73\u003e] kmemleak_alloc+0x34/0x40\\n\\t    [\u003c0000000043605459\u003e] __kmalloc_cache_noprof+0x26c/0x2f4\\n\\t    [\u003c000000000ff63fd4\u003e] vcap_rule_add_key+0x2cc/0x528\\n\\t    [\u003c00000000991e3564\u003e] vcap_val_rule+0xcf0/0x13e8\\n\\t    [\u003c00000000fc9868e5\u003e] vcap_api_encode_rule_test+0x678/0x16b0\\n\\t    [\u003c00000000b3595fc4\u003e] kunit_try_run_case+0x13c/0x3ac\\n\\t    [\u003c0000000010f5d2bf\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\\n\\t    [\u003c00000000c5d82c9a\u003e] kthread+0x2e8/0x374\\n\\t    [\u003c00000000f4287308\u003e] ret_from_fork+0x10/0x20\\n\\tunreferenced object 0xffffff80cc0b0980 (size 64):\\n\\t  comm \\\"kunit_try_catch\\\", pid 1215, jiffies 4294898266\\n\\t  hex dump (first 32 bytes):\\n\\t    18 b7 58 ca 80 ff ff ff 00 09 0b cc 80 ff ff ff  ..X.............\\n\\t    67 00 00 00 00 00 00 00 01 01 74 88 c0 ff ff ff  g.........t.....\\n\\t  backtrace (crc 275fd9be):\\n\\t    [\u003c0000000052a0be73\u003e] kmemleak_alloc+0x34/0x40\\n\\t    [\u003c0000000043605459\u003e] __kmalloc_cache_noprof+0x26c/0x2f4\\n\\t    [\u003c000000000ff63fd4\u003e] vcap_rule_add_key+0x2cc/0x528\\n\\t    [\u003c000000001396a1a2\u003e] test_add_de\\n---truncated---\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() el commit a3c1e45156ad (\\\"net: microchip: vcap: Fix use-after-free error in kunit test\\\") corrigi\u00f3 el error use-after-free, pero introdujo las siguientes fugas de memoria al eliminar vcap_free_rule() necesario, agr\u00e9guelo para solucionarlo. objeto sin referencia 0xffffff80ca58b700 (tama\u00f1o 192): comm \\\"kunit_try_catch\\\", pid 1215, jiffies 4294898264 volcado hexadecimal (primeros 32 bytes): 00 12 7a 00 05 00 00 00 0a 00 00 00 64 00 00 00 ..z.........d... 00 00 00 00 00 00 00 00 00 04 0b cc 80 ff ff ff ................ backtrace (crc 9c09c3fe): [\u0026lt;0000000052a0be73\u0026gt;] kmemleak_alloc+0x34/0x40 [\u0026lt;0000000043605459\u0026gt;] __kmalloc_cache_noprof+0x26c/0x2f4 [\u0026lt;0000000040a01b8d\u0026gt;] vcap_alloc_rule+0x3cc/0x9c4 [\u0026lt;000000003fe86110\u0026gt;] vcap_api_encode_rule_test+0x1ac/0x16b0 [\u0026lt;00000000b3595fc4\u0026gt;] kunit_try_run_case+0x13c/0x3ac [\u0026lt;0000000010f5d2bf\u0026gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [\u0026lt;00000000c5d82c9a\u0026gt;] kthread+0x2e8/0x374 [\u0026lt;00000000f4287308\u0026gt;] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80cc0b0400 (tama\u00f1o 64): comm \\\"kunit_try_catch\\\", pid 1215, jiffies 4294898265 volcado hexadecimal (primeros 32 bytes): 80 04 0b cc 80 ff ff ff 18 b7 58 ca 80 ff ff ff ..........X..... 39 00 00 00 02 00 00 00 06 05 04 03 02 01 ff ff 9................ seguimiento inverso (crc daf014e9): [\u0026lt;0000000052a0be73\u0026gt;] kmemleak_alloc+0x34/0x40 [\u0026lt;0000000043605459\u0026gt;] __kmalloc_cache_noprof+0x26c/0x2f4 [\u0026lt;000000000ff63fd4\u0026gt;] vcap_rule_add_key+0x2cc/0x528 [\u0026lt;00000000dfdb1e81\u0026gt;] vcap_api_encode_rule_test+0x224/0x16b0 [\u0026lt;00000000b3595fc4\u0026gt;] kunit_try_run_case+0x13c/0x3ac [\u0026lt;0000000010f5d2bf\u0026gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [\u0026lt;00000000c5d82c9a\u0026gt;] kthread+0x2e8/0x374 [\u0026lt;00000000f4287308\u0026gt;] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80cc0b0700 (tama\u00f1o 64): comm \\\"kunit_try_catch\\\", pid 1215, jiffies 4294898265 volcado hexadecimal (primeros 32 bytes): 80 07 0b cc 80 ff ff ff 28 b7 58 ca 80 ff ff ff ........(.X..... 3c 00 00 00 00 00 00 00 01 2f 03 b3 ec ff ff ff \u0026lt;......../...... seguimiento inverso (crc 8d877792): [\u0026lt;0000000052a0be73\u0026gt;] kmemleak_alloc+0x34/0x40 [\u0026lt;0000000043605459\u0026gt;] __kmalloc_cache_noprof+0x26c/0x2f4 [\u0026lt;000000006eadfab7\u0026gt;] vcap_rule_add_action+0x2d0/0x52c [\u0026lt;00000000323475d1\u0026gt;] vcap_api_encode_rule_test+0x4d4/0x16b0 [\u0026lt;00000000b3595fc4\u0026gt;] kunit_try_run_case+0x13c/0x3ac [\u0026lt;0000000010f5d2bf\u0026gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [\u0026lt;00000000c5d82c9a\u0026gt;] kthread+0x2e8/0x374 [\u0026lt;00000000f4287308\u0026gt;] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80cc0b0900 (tama\u00f1o 64): comm \\\"kunit_try_catch\\\", pid 1215, jiffies 4294898266 volcado hexadecimal (primeros 32 bytes): 80 09 0b cc 80 ff ff ff 80 06 0b cc 80 ff ff ff ................ 7d 00 00 00 01 00 00 00 00 00 00 00 ff 00 00 00 }............... seguimiento inverso (crc 34181e56): [\u0026lt;0000000052a0be73\u0026gt;] kmemleak_alloc+0x34/0x40 [\u0026lt;0000000043605459\u0026gt;] __kmalloc_cache_noprof+0x26c/0x2f4 [\u0026lt;000000000ff63fd4\u0026gt;] vcap_rule_add_key+0x2cc/0x528 [\u0026lt;00000000991e3564\u0026gt;] vcap_val_rule+0xcf0/0x13e8 [\u0026lt;00000000fc9868e5\u0026gt;] vcap_api_encode_rule_test+0x678/0x16b0 [\u0026lt;00000000b3595fc4\u0026gt;] kunit_try_run_case+0x13c/0x3ac [\u0026lt;0000000010f5d2bf\u0026gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [\u0026lt;00000000c5d82c9a\u0026gt;] kthread+0x2e8/0x374 [\u0026lt;00000000f4287308\u0026gt;] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80cc0b0980 (tama\u00f1o 64): comm \\\"kunit_try_catch\\\", pid 1215, jiffies 4294898266 volcado hexadecimal (primeros 32 bytes): 18 b7 58 ca 80 ff ff ff 00 09 0b cc 80 y siguientes y siguientes y siguientes ..X............. 67 00 00 00 00 00 00 00 01 01 74 88 c0 y siguientes y siguientes y siguientes g.........t..... seguimiento inverso (crc 275fd9be): [\u0026lt;0000000052a0be73\u0026gt;] kmemleak_alloc+0x34/0x40 [\u0026lt;0000000043605459\u0026gt;] __kmalloc_cache_noprof+0x26c/0x2f4 [\u0026lt;000000000ff63fd4\u0026gt;] vcap_rule_add_key+0x2cc/0x528 [\u0026lt;0\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.6.51\",\"versionEndExcluding\":\"6.6.58\",\"matchCriteriaId\":\"FD026C8A-6C8C-4930-8E05-51AFEE675460\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.10.10\",\"versionEndExcluding\":\"6.11\",\"matchCriteriaId\":\"20B10614-CE0D-494A-9FEA-F01A6985C9B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.5\",\"matchCriteriaId\":\"566D17E8-7DD1-40F5-9042-8FDAE762B036\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F361E1D-580F-4A2D-A509-7615F73167A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"925478D0-3E3D-4E6F-ACD5-09F28D5DF82C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C95E234-D335-4B6C-96BF-E2CEBD8654ED\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/170792097bb21e5da77443b6a03d35489813eabe\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/20b5342de51bda794791e013b90754774003a515\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/217a3d98d1e9891a8b1438a27dfbc64ddf01f691\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.