CVE-2024-49975
uprobes: fix kernel info leak via "[uprobes]" vma
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: uprobes: fix kernel info leak via "[uprobes]" vma xol_add_vma() maps the uninitialized page allocated by __create_xol_area() into userspace. On some architectures (x86) this memory is readable even without VM_READ, VM_EXEC results in the same pgprot_t as VM_EXEC|VM_READ, although this doesn't really matter, debugger can read this memory anyway.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 21, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
d4b3b6384f98f8692ad0209891ccdbc7e78bbefe < f31f92107e5a8ecc8902705122c594e979a351fe d4b3b6384f98f8692ad0209891ccdbc7e78bbefe < fe5e9182d3e227476642ae2b312e2356c4d326a3 d4b3b6384f98f8692ad0209891ccdbc7e78bbefe < f561b48d633ac2e7d0d667020fc634a96ade33a0 d4b3b6384f98f8692ad0209891ccdbc7e78bbefe < 21cb47db1ec9765f91304763a24565ddc22d2492 d4b3b6384f98f8692ad0209891ccdbc7e78bbefe < 24141df5a8615790950deedd926a44ddf1dfd6d8 d4b3b6384f98f8692ad0209891ccdbc7e78bbefe < 5b981d8335e18aef7908a068529a3287258ff6d8 d4b3b6384f98f8692ad0209891ccdbc7e78bbefe < 2aa45f43709ba2082917bd2973d02687075b6eee d4b3b6384f98f8692ad0209891ccdbc7e78bbefe < 9634e8dc964a4adafa7e1535147abd7ec29441a6 d4b3b6384f98f8692ad0209891ccdbc7e78bbefe < 34820304cc2cd1804ee1f8f3504ec77813d29c8e
Linux / Linux
3.5
References
git.kernel.org: https://git.kernel.org/stable/c/f31f92107e5a8ecc8902705122c594e979a351fe git.kernel.org: https://git.kernel.org/stable/c/fe5e9182d3e227476642ae2b312e2356c4d326a3 git.kernel.org: https://git.kernel.org/stable/c/f561b48d633ac2e7d0d667020fc634a96ade33a0 git.kernel.org: https://git.kernel.org/stable/c/21cb47db1ec9765f91304763a24565ddc22d2492 git.kernel.org: https://git.kernel.org/stable/c/24141df5a8615790950deedd926a44ddf1dfd6d8 git.kernel.org: https://git.kernel.org/stable/c/5b981d8335e18aef7908a068529a3287258ff6d8 git.kernel.org: https://git.kernel.org/stable/c/2aa45f43709ba2082917bd2973d02687075b6eee git.kernel.org: https://git.kernel.org/stable/c/9634e8dc964a4adafa7e1535147abd7ec29441a6 git.kernel.org: https://git.kernel.org/stable/c/34820304cc2cd1804ee1f8f3504ec77813d29c8e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html