๐Ÿ” CVE Alert

CVE-2024-58085

UNKNOWN 0.0

tomoyo: don't emit warning in tomoyo_write_control()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: tomoyo: don't emit warning in tomoyo_write_control() syzbot is reporting too large allocation warning at tomoyo_write_control(), for one can write a very very long line without new line character. To fix this warning, I use __GFP_NOWARN rather than checking for KMALLOC_MAX_SIZE, for practically a valid line should be always shorter than 32KB where the "too small to fail" memory-allocation rule applies. One might try to write a valid line that is longer than 32KB, but such request will likely fail with -ENOMEM. Therefore, I feel that separately returning -EINVAL when a line is longer than KMALLOC_MAX_SIZE is redundant. There is no need to distinguish over-32KB and over-KMALLOC_MAX_SIZE.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 6, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
bd03a3e4c9a9df0c6b007045fa7fc8889111a478 < c67efabddc73171c7771d3ffe4ffa1e503ee533e bd03a3e4c9a9df0c6b007045fa7fc8889111a478 < f6b37b3e12de638753bce79a2858070b9c4a4ad3 bd03a3e4c9a9df0c6b007045fa7fc8889111a478 < b2bd5857a0d6973ebbcb4d9831ddcaebbd257be1 bd03a3e4c9a9df0c6b007045fa7fc8889111a478 < a01c200fa7eb59da4d2dbbb48b61f4a0d196c09f bd03a3e4c9a9df0c6b007045fa7fc8889111a478 < fe1c021eb03dae0dc9dce55e81f77a60e419a27a bd03a3e4c9a9df0c6b007045fa7fc8889111a478 < c9382f380e8d09209b8e5c0def0545852168be25 bd03a3e4c9a9df0c6b007045fa7fc8889111a478 < 414705c0303350d139b1dc18f329fe47dfb642dd bd03a3e4c9a9df0c6b007045fa7fc8889111a478 < 3df7546fc03b8f004eee0b9e3256369f7d096685
Linux / Linux
3.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c67efabddc73171c7771d3ffe4ffa1e503ee533e git.kernel.org: https://git.kernel.org/stable/c/f6b37b3e12de638753bce79a2858070b9c4a4ad3 git.kernel.org: https://git.kernel.org/stable/c/b2bd5857a0d6973ebbcb4d9831ddcaebbd257be1 git.kernel.org: https://git.kernel.org/stable/c/a01c200fa7eb59da4d2dbbb48b61f4a0d196c09f git.kernel.org: https://git.kernel.org/stable/c/fe1c021eb03dae0dc9dce55e81f77a60e419a27a git.kernel.org: https://git.kernel.org/stable/c/c9382f380e8d09209b8e5c0def0545852168be25 git.kernel.org: https://git.kernel.org/stable/c/414705c0303350d139b1dc18f329fe47dfb642dd git.kernel.org: https://git.kernel.org/stable/c/3df7546fc03b8f004eee0b9e3256369f7d096685 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html