{"uuid": "5829fb50-c9fd-40fc-aaf0-51839570d8ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50084", "type": "seen", "source": "https://t.me/cvedetector/9225", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50084 - Microchip Linux Kernel VCAP API Use-After-Free and Memory Leak Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50084 \nPublished : Oct. 29, 2024, 1:15 a.m. | 38\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()  \n  \nCommit a3c1e45156ad (\"net: microchip: vcap: Fix use-after-free error in  \nkunit test\") fixed the use-after-free error, but introduced below  \nmemory leaks by removing necessary vcap_free_rule(), add it to fix it.  \n  \n unreferenced object 0xffffff80ca58b700 (size 192):  \n   comm \"kunit_try_catch\", pid 1215, jiffies 4294898264  \n   hex dump (first 32 bytes):  \n     00 12 7a 00 05 00 00 00 0a 00 00 00 64 00 00 00  ..z.........d...  \n     00 00 00 00 00 00 00 00 00 04 0b cc 80 ff ff ff  ................  \n   backtrace (crc 9c09c3fe):  \n     [&lt;0000000052a0be73] kmemleak_alloc+0x34/0x40  \n     [&lt;0000000043605459] __kmalloc_cache_noprof+0x26c/0x2f4  \n     [&lt;0000000040a01b8d] vcap_alloc_rule+0x3cc/0x9c4  \n     [&lt;000000003fe86110] vcap_api_encode_rule_test+0x1ac/0x16b0  \n     [&lt;00000000b3595fc4] kunit_try_run_case+0x13c/0x3ac  \n     [&lt;0000000010f5d2bf] kunit_generic_run_threadfn_adapter+0x80/0xec  \n     [&lt;00000000c5d82c9a] kthread+0x2e8/0x374  \n     [&lt;00000000f4287308] ret_from_fork+0x10/0x20  \n unreferenced object 0xffffff80cc0b0400 (size 64):  \n   comm \"kunit_try_catch\", pid 1215, jiffies 4294898265  \n   hex dump (first 32 bytes):  \n     80 04 0b cc 80 ff ff ff 18 b7 58 ca 80 ff ff ff  ..........X.....  \n     39 00 00 00 02 00 00 00 06 05 04 03 02 01 ff ff  9...............  \n   backtrace (crc daf014e9):  \n     [&lt;0000000052a0be73] kmemleak_alloc+0x34/0x40  \n     [&lt;0000000043605459] __kmalloc_cache_noprof+0x26c/0x2f4  \n     [&lt;000000000ff63fd4] vcap_rule_add_key+0x2cc/0x528  \n     [&lt;00000000dfdb1e81] vcap_api_encode_rule_test+0x224/0x16b0  \n     [&lt;00000000b3595fc4] kunit_try_run_case+0x13c/0x3ac  \n     [&lt;0000000010f5d2bf] kunit_generic_run_threadfn_adapter+0x80/0xec  \n     [&lt;00000000c5d82c9a] kthread+0x2e8/0x374  \n     [&lt;00000000f4287308] ret_from_fork+0x10/0x20  \n unreferenced object 0xffffff80cc0b0700 (size 64):  \n   comm \"kunit_try_catch\", pid 1215, jiffies 4294898265  \n   hex dump (first 32 bytes):  \n     80 07 0b cc 80 ff ff ff 28 b7 58 ca 80 ff ff ff  ........(.X.....  \n     3c 00 00 00 00 00 00 00 01 2f 03 b3 ec ff ff ff &lt;........&lt;0000000052a0be73] kmemleak_alloc+0x34/0x40  \n     [&lt;0000000043605459] __kmalloc_cache_noprof+0x26c/0x2f4  \n     [&lt;000000006eadfab7] vcap_rule_add_action+0x2d0/0x52c  \n     [&lt;00000000323475d1] vcap_api_encode_rule_test+0x4d4/0x16b0  \n     [&lt;00000000b3595fc4] kunit_try_run_case+0x13c/0x3ac  \n     [&lt;0000000010f5d2bf] kunit_generic_run_threadfn_adapter+0x80/0xec  \n     [&lt;00000000c5d82c9a] kthread+0x2e8/0x374  \n     [&lt;00000000f4287308] ret_from_fork+0x10/0x20  \n unreferenced object 0xffffff80cc0b0900 (size 64):  \n   comm \"kunit_try_catch\", pid 1215, jiffies 4294898266  \n   hex dump (first 32 bytes):  \n     80 09 0b cc 80 ff ff ff 80 06 0b cc 80 ff ff ff  ................  \n     7d 00 00 00 01 00 00 00 00 00 00 00 ff 00 00 00  }...............  \n   backtrace (crc 34181e56):  \n     [&lt;0000000052a0be73] kmemleak_alloc+0x34/0x40  \n     [&lt;0000000043605459] __kmalloc_cache_noprof+0x26c/0x2f4  \n     [&lt;000000000ff63fd4] vcap_rule_add_key+0x2cc/0x528  \n     [&lt;00000000991e3564] vcap_val_rule+0xcf0/0x13e8  \n     [&lt;00000000fc9868e5] vcap_api_encode_rule_test+0x678/0x16b0  \n     [&lt;00000000b3595fc4] kunit_try_run_case+0x13c/0x3ac  \n     [&lt;0000000010f5d2bf] kunit_generic_run_threadfn_adapter+0x80/0xec  \n     [&lt;00000000c5d82c9a] kthread+0x2e8/0x374  \n     [&lt;00000000f4287308] ret_from_fork+0x10/0x20  \n unreferenced object 0xffffff80cc0b0980 (size 64):  \n   comm \"kunit_try_catch\", pid 1215, jiffies 4294898266  \n   hex dump (first 32 bytes):  \n     18 b7 58 ca 80 ff ff ff 00 09 0b cc 8[...]", "creation_timestamp": "2024-10-29T03:03:01.000000Z"}