In the Linux kernel, the following vulnerability has been resolved:
dm vdo: don't refer to dedupe_context after releasing it
Clear the dedupe_context pointer in a data_vio whenever ownership of
the context is lost, so that vdo can't examine it accidentally.
References
Configurations
History
No history.
Information
Published : 2024-11-05 17:15
Updated : 2024-11-12 21:44
NVD link : CVE-2024-50091
Mitre link : CVE-2024-50091
CVE.ORG link : CVE-2024-50091
JSON object : View
Products Affected
linux
- linux_kernel
CWE