Use After Free in Linux Kernel's Kunit Debugging System
CVE-2024-56772

7.8HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
8 January 2025

Summary

A vulnerability has been identified in the Linux kernel's Kunit debugging framework, specifically related to memory management. In the function kunit_debugfs_create_suite(), a flaw occurs when the allocation of a string stream fails during the execution of the kunit_suite_for_each_test_case() loop. If this allocation fails, the function does not properly nullify the stream pointer after freeing it. This oversight can lead to a Use After Free scenario, resulting in potential kernel panics or data corruption. The resolution involves modifying the error-handling path to ensure that the stream pointer is set to NULL post-free, mitigating the risk associated with accessing freed memory.

Affected Version(s)

Linux a3fdf784780ccb0008d630e8722d1389c49c7499 < 3213b92754b94dec6836e8b4d6ec7d224a805b61

Linux a3fdf784780ccb0008d630e8722d1389c49c7499 < 39e21403c978862846fa68b7f6d06f9cca235194

Linux 6.7

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.