Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ublk: don't allow user copy for unprivileged device UBLK_F_USER_COPY requires userspace to call write() on ublk char device for filling request buffer, and unprivileged device can't be trusted. So don't allow user copy for unprivileged device.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.5, < 6.6.58 |
References
- https://git.kernel.org/stable/c/42aafd8b48adac1c3b20fe5892b1b91b80c1a1e6Patch
- https://git.kernel.org/stable/c/6414ab5c9c9c068eca6dc4fd3a036bc4b83164dcPatch
- https://git.kernel.org/stable/c/8f3d5686a2409877c5e8e2540774d24ed2b4a4cePatch
FAQ
What is CVE-2024-50080?
CVE-2024-50080 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ublk: don't allow user copy for unprivileged device UBLK_F_USER_COPY requires userspace to call write() on ublk char device for fi...
How severe is CVE-2024-50080?
CVE-2024-50080 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-50080?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.