
Cloud Vulnerability DB
A community-led vulnerabilities database
A memory leak vulnerability (CVE-2024-50254) was discovered in the Linux kernel's BPF subsystem. The issue exists in the bpf_iter_bits_destroy() function, which incorrectly checks whether bits are dynamically allocated using the condition 'kit->nr_bits <= 64'. This vulnerability was introduced by the commit that added the bits iterator functionality and has been resolved in Linux kernel version 6.11.7 (Kernel Patch).
The vulnerability stems from an incorrect check in bpf_iter_bits_destroy() where nr_bits is set to zero in bpf_iter_bits_next() after all bits have been iterated. This leads to a kmemleak condition where dynamically allocated memory is not properly freed. The issue has been assigned a CVSS v3.1 base score of 5.5 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability results in a kernel memory leak (kmemleak) which could lead to resource exhaustion over time. While the impact is primarily limited to system availability, it does not appear to have direct consequences for system confidentiality or integrity (NVD).
The issue has been fixed by modifying the bpf_iter_bits_next() function to set kit->bit to kit->nr_bits instead of setting kit->nr_bits to zero when iteration completes. Additionally, the check for iteration completion has been updated to use '!nr_bits || bits >= nr_bits', while still using 'nr_bits > 64' to indicate whether bits are dynamically allocated. The fix is available in Linux kernel version 6.11.7 (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."