PT-2024-34051 · Linux +4 · Linux Kernel +4

Published

2024-10-23

·

Updated

2025-06-09

·

CVE-2024-50216

CVSS v3.1
5.5
VectorAV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions: Linux kernel versions prior to 6.6.61
Description: The issue is related to the xfs file system in the Linux kernel. Specifically, the problem occurs in the
xfs filestream pick ag
function when it fails to find a suitable allocation group (AG) and attempts to pick an online AG as a last resort. The loop for this last resort uses
args->pag
as a loop iterator, but the later code expects
pag
to be set. The fix involves reusing the
max pag
case for this last resort and adding a check for the impossible case of no AG to prevent the uninitialized
pag
from escaping.
Recommendations: For Linux kernel versions prior to 6.6.61, update to version 6.6.61 or later to resolve the issue. As a temporary workaround, consider restricting access to the
xfs filestream pick ag
function until a patch is available.

Fix

Access of Uninitialized Pointer

Weakness Enumeration

Related Identifiers

BDU:2025-07910
CVE-2024-50216
INFSA-2025_6966
MGASA-2024-0368
MGASA-2024-0369
OESA-2024-2492
OPENSUSE-SU-2024:14500-1
OPENSUSE-SU-2024_4314-1
OPENSUSE-SU-2024_4316-1
OPENSUSE-SU-2025:14705-1
RHSA-2025:6966
RHSA-2025_6966
SUSE-SU-2024:4314-1
SUSE-SU-2024:4316-1
SUSE-SU-2024:4318-1
SUSE-SU-2024:4387-1
USN-7276-1
USN-7277-1
USN-7310-1
USN-7449-1
USN-7449-2
USN-7450-1
USN-7451-1
USN-7452-1
USN-7453-1
USN-7468-1
USN-7523-1
USN-7524-1

Affected Products

Linuxmint
Linux Kernel
Red Hat
Suse
Ubuntu