Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: dm vdo: don't refer to dedupe_context after releasing it Clear the dedupe_context pointer in a data_vio whenever ownership of the context is lost, so that vdo can't examine it accidentally.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.11.4 |
References
- https://git.kernel.org/stable/c/0808ebf2f80b962e75741a41ced372a7116f1e26Patch
- https://git.kernel.org/stable/c/63ef073084c67878d7a92e15ad055172da3f05a3Patch
FAQ
What is CVE-2024-50091?
CVE-2024-50091 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: dm vdo: don't refer to dedupe_context after releasing it Clear the dedupe_context pointer in a data_vio whenever ownership of the ...
How severe is CVE-2024-50091?
CVE-2024-50091 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-50091?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.