U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-26993 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection() The sysfs_break_active_protection() routine has an obvious reference leak in its error path. If the call to kernfs_find_and_get() fails then kn will be NULL, so the companion sysfs_unbreak_active_protection() routine won't get called (and would only cause an access violation by trying to dereference kn->parent if it was called). As a result, the reference to kobj acquired at the start of the function will never be released. Fix the leak by adding an explicit kobject_put() call when kn is NULL.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/43f00210cb257bcb0387e8caeb4b46375d67f30c
https://git.kernel.org/stable/c/43f00210cb257bcb0387e8caeb4b46375d67f30c
https://git.kernel.org/stable/c/57baab0f376bec8f54b0fe6beb8f77a57c228063
https://git.kernel.org/stable/c/57baab0f376bec8f54b0fe6beb8f77a57c228063
https://git.kernel.org/stable/c/5d43e072285e81b0b63cee7189b3357c7768a43b
https://git.kernel.org/stable/c/5d43e072285e81b0b63cee7189b3357c7768a43b
https://git.kernel.org/stable/c/84bd4c2ae9c3d0a7d3a5c032ea7efff17af17e17
https://git.kernel.org/stable/c/84bd4c2ae9c3d0a7d3a5c032ea7efff17af17e17
https://git.kernel.org/stable/c/a4c99b57d43bab45225ba92d574a8683f9edc8e4
https://git.kernel.org/stable/c/a4c99b57d43bab45225ba92d574a8683f9edc8e4
https://git.kernel.org/stable/c/a90bca2228c0646fc29a72689d308e5fe03e6d78
https://git.kernel.org/stable/c/a90bca2228c0646fc29a72689d308e5fe03e6d78
https://git.kernel.org/stable/c/ac107356aabc362aaeb77463e814fc067a5d3957
https://git.kernel.org/stable/c/ac107356aabc362aaeb77463e814fc067a5d3957
https://git.kernel.org/stable/c/f28bba37fe244889b81bb5c508d3f6e5c6e342c5
https://git.kernel.org/stable/c/f28bba37fe244889b81bb5c508d3f6e5c6e342c5
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Weakness Enumeration

CWE-ID CWE Name Source

Change History

9 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-26993
NVD Published Date:
05/01/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org