CVE-2024-50143

CVSS 3.1 Score 7.8 of 10 (high)

Details

Published Nov 7, 2024
Updated: Nov 15, 2024
CWE ID 908

Summary

CVE-2024-50143: A vulnerability has been identified and addressed in the Linux kernel. This issue, named KMSAN (Kernel Mode Sample After Name), affected the 'udf' filesystem's 'udf_get_fileshortad' function. The vulnerability arose from uninitialized value usage in 'udf_current_aext'. To mitigate the risk of exploitation, developers implemented a check for potential overflow in 'udf_current_aext'. Post-patch application, no issues were triggered during testing. [ Sources: 1. <https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df> 2. <https://syzkaller.appspot.com/x/log.txt?x=10242227980000>] In the Linux kernel, a newly discovered vulnerability (CVE-2024-50143) has been resolved. This issue, named KMSAN (Kernel Mode Sample After Name), was located in the 'udf' filesystem's 'udf_get_fileshortad' function. The root cause was uninitialized value usage in 'udf_current_aext'. To minimize the risk of potential attacks, the developers implemented an overflow check for 'udf_current_aext'. Following the patch application, testing revealed no triggered issues. [ Sources: 1. <https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df> 2. <https://syzkaller.appspot.com/x/log.txt?x=10242227980000>] CVE-2024-50143 refers to a vulnerability in the Linux kernel, specifically within the 'udf' filesystem's 'udf_get_fileshortad' function. This issue, named KMSAN (Kernel Mode Sample After Name), arose due to uninitialized value usage in 'udf_current_aext'. To diminish the security risks, developers introduced an overflow check for 'udf_current_aext'. Upon applying the patch, no triggering issues were detected during testing. [ Sources: 1. <https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df> 2. <https://syzkaller.appspot.com/x/log.txt?x=10242227980000>] CVE-2024-50143 is a recently identified vulnerability in the Linux kernel, affecting the 'udf' filesystem's 'udf_get_fileshortad' function. Known as KMSAN (Kernel Mode Sample After Name), this issue was caused by uninitialized value usage in 'udf_current_aext'. In response, developers implemented a check for potential overflow in 'udf_current_aext' to reduce the risk of exploitation. Following the patch application, testing confirmed no issues were triggered. [ Sources: 1. <https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df> 2. <https://syzkaller.appspot.com/x/log.txt?x=10242227980000>] The recently uncovered CVE-2024-50143 vulnerability, also known as KMSAN (Kernel Mode Sample After Name), impacts the Linux kernel's 'udf' filesystem and its 'udf_get_fileshortad' function. This issue was rooted in uninitialized value usage in 'udf_current_aext'. Subsequently, developers added an overflow check for 'udf_current_aext' to minimize potential risks. Post-patch application, testing confirmed no issues were detected. [ Sources: 1. <https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df> 2. <https://syzkaller.appspot.com/x/log.txt?x=10242227980000>] CVE-2024-50143, also referred to as KMSAN (Kernel Mode Sample After Name), is a recently surfaced vulnerability impacting the Linux kernel's 'udf' filesystem and its 'udf_get_fileshortad' function. The root cause was uninitialized value usage in 'udf_current_aext'. In an effort to mitigate risks, developers implemented an overflow check for 'udf_current_aext'. After applying the patch, testing confirmed no triggered issues. [ Sources: 1. <https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df> 2. <https://syzkaller.appspot.com/x/log.txt?x=10242227980000>]

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share