CVE-2024-57930Improper Control of a Resource Through its Lifetime in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 92.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 21

Description

In the Linux kernel, the following vulnerability has been resolved: tracing: Have process_string() also allow arrays In order to catch a common bug where a TRACE_EVENT() TP_fast_assign() assigns an address of an allocated string to the ring buffer and then references it in TP_printk(), which can be executed hours later when the string is free, the function test_event_printk() runs on all events as they are registered to make sure there's no unwanted dereferencing. It calls process_string() to

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

NVDlinux/linux_kernel6.1.1226.1.124+3
Debianlinux/linux_kernel< 6.1.124-1+2
CVEListV5linux/linux85d7635d54d75a2589f28583dc17feedc3aa4ad63bcdc9039a6e9e6e47ed689a37b8d57894a3c571+7
debiandebian/linux< linux 6.1.124-1 (bookworm)
debiandebian/linux-6.1< linux 6.1.124-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2024-57930: In the Linux kernel, the following vulnerability has been resolved: tracing: Have process_string() also allow arrays In order to catch a common bug wh2025-01-21
GHSA
GHSA-j6wf-6qh3-cm45: In the Linux kernel, the following vulnerability has been resolved: tracing: Have process_string() also allow arrays In order to catch a common bug2025-01-21

📋Vendor Advisories

2
Red Hat
kernel: tracing: Have process_string() also allow arrays2025-01-21
Debian
CVE-2024-57930: linux - In the Linux kernel, the following vulnerability has been resolved: tracing: Ha...2024