CVE-2024-27066

In the Linux kernel, the following vulnerability has been resolved: virtio: packed: fix unmap leak for indirect desc table When use_dma_api and premapped are true, then the do_unmap is false. Because the do_unmap is false, vring_unmap_extra_packed is not called by detach_buf_packed. if (unlikely(vq->do_unmap)) { curr = id; for (i = 0; i < state->num; i++) { vring_unmap_extra_packed(vq, &vq->packed.desc_extra[curr]); curr = vq->packed.desc_extra[curr].next; } } So the indirect desc table is not unmapped. This causes the unmap leak. So here, we check vq->use_dma_api instead. Synchronously, dma info is updated based on use_dma_api judgment This bug does not occur, because no driver use the premapped with indirect.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Sep 2025, 16:56

Type Values Removed Values Added
CWE CWE-401
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/51bacd9d29bf98c3ebc65e4a0477bb86306b4140 - () https://git.kernel.org/stable/c/51bacd9d29bf98c3ebc65e4a0477bb86306b4140 - Patch
References () https://git.kernel.org/stable/c/75450ff8c6fe8755bf5b139b238eaf9739cfd64e - () https://git.kernel.org/stable/c/75450ff8c6fe8755bf5b139b238eaf9739cfd64e - Patch
References () https://git.kernel.org/stable/c/d5c0ed17fea60cca9bc3bf1278b49ba79242bbcd - () https://git.kernel.org/stable/c/d5c0ed17fea60cca9bc3bf1278b49ba79242bbcd - Patch
References () https://git.kernel.org/stable/c/e142169aca5546ae6619c39a575cda8105362100 - () https://git.kernel.org/stable/c/e142169aca5546ae6619c39a575cda8105362100 - Patch

21 Nov 2024, 09:03

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: virtio: empaquetado: corrige la fuga de desasignación para la tabla desc indirecta Cuando use_dma_api y premapped son verdaderos, entonces do_unmap es falso. Debido a que do_unmap es falso, detach_buf_packed no llama a vring_unmap_extra_packed. if (improbable(vq-&gt;do_unmap)) { curr = id; for (i = 0; i &lt; estado-&gt;num; i++) { vring_unmap_extra_packed(vq, &amp;vq-&gt;packed.desc_extra[curr]); curr = vq-&gt;packed.desc_extra[curr].next; } } Por lo tanto, la tabla de descripción indirecta no está desasignada. Esto provoca la fuga de desasignación. Así que aquí marcamos vq-&gt;use_dma_api en su lugar. Sincrónicamente, la información de dma se actualiza según el criterio use_dma_api. Este error no ocurre porque ningún controlador utiliza el preasignado con indirecto.
References () https://git.kernel.org/stable/c/51bacd9d29bf98c3ebc65e4a0477bb86306b4140 - () https://git.kernel.org/stable/c/51bacd9d29bf98c3ebc65e4a0477bb86306b4140 -
References () https://git.kernel.org/stable/c/75450ff8c6fe8755bf5b139b238eaf9739cfd64e - () https://git.kernel.org/stable/c/75450ff8c6fe8755bf5b139b238eaf9739cfd64e -
References () https://git.kernel.org/stable/c/d5c0ed17fea60cca9bc3bf1278b49ba79242bbcd - () https://git.kernel.org/stable/c/d5c0ed17fea60cca9bc3bf1278b49ba79242bbcd -
References () https://git.kernel.org/stable/c/e142169aca5546ae6619c39a575cda8105362100 - () https://git.kernel.org/stable/c/e142169aca5546ae6619c39a575cda8105362100 -

01 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 13:15

Updated : 2025-09-18 16:56


NVD link : CVE-2024-27066

Mitre link : CVE-2024-27066

CVE.ORG link : CVE-2024-27066


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime