CVE-2024-50067Out-of-bounds Write in Linux

Severity
7.8HIGHNVD
OSV8.8OSV5.5
EPSS
0.0%
top 90.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 28
Latest updateJan 12

Description

In the Linux kernel, the following vulnerability has been resolved: uprobe: avoid out-of-bounds memory access of fetching args Uprobe needs to fetch args into a percpu buffer, and then copy to ring buffer to avoid non-atomic context problem. Sometimes user-space strings, arrays can be very large, but the size of percpu buffer is only page size. And store_trace_args() won't check whether these data exceeds a single page or not, caused out-of-bounds memory access. It could be reproduced by fol

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages11 packages

Patches

🔴Vulnerability Details

35
OSV
linux-iot vulnerabilities2026-01-12
OSV
linux-kvm vulnerabilities2026-01-09
OSV
linux-raspi, linux-raspi-5.4 vulnerabilities2026-01-06
OSV
linux-oracle-5.4 vulnerabilities2025-12-19
OSV
linux-raspi vulnerabilities2025-12-19

📋Vendor Advisories

35
Ubuntu
Linux kernel (IoT) vulnerabilities2026-01-12
Ubuntu
Linux kernel (KVM) vulnerabilities2026-01-09
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2026-01-06
Ubuntu
Linux kernel (Oracle) vulnerabilities2025-12-19
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-12-19