#VU100085 Use of uninitialized resource in Linux kernel - CVE-2024-50164
Published: November 7, 2024 / Updated: May 12, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the check_helper_mem_access(), check_mem_size_reg(), check_mem_reg(), check_kfunc_mem_size_reg() and verbose() functions in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/48068ccaea957469f1adf78dfd2c1c9a7e18f0fe
- https://git.kernel.org/stable/c/54bc31682660810af1bed7ca7a19f182df8d3df8
- https://git.kernel.org/stable/c/8ea607330a39184f51737c6ae706db7fdca7628e
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.125
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11.6
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.59