{"id":"CVE-2024-26901","summary":"do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndo_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak\n\nsyzbot identified a kernel information leak vulnerability in\ndo_sys_name_to_handle() and issued the following report [1].\n\n[1]\n\"BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x100 lib/usercopy.c:40\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n _copy_to_user+0xbc/0x100 lib/usercopy.c:40\n copy_to_user include/linux/uaccess.h:191 [inline]\n do_sys_name_to_handle fs/fhandle.c:73 [inline]\n __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]\n __se_sys_name_to_handle_at+0x949/0xb10 fs/fhandle.c:94\n __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94\n ...\n\nUninit was created at:\n slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\n slab_alloc_node mm/slub.c:3478 [inline]\n __kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517\n __do_kmalloc_node mm/slab_common.c:1006 [inline]\n __kmalloc+0x121/0x3c0 mm/slab_common.c:1020\n kmalloc include/linux/slab.h:604 [inline]\n do_sys_name_to_handle fs/fhandle.c:39 [inline]\n __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]\n __se_sys_name_to_handle_at+0x441/0xb10 fs/fhandle.c:94\n __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94\n ...\n\nBytes 18-19 of 20 are uninitialized\nMemory access of size 20 starts at ffff888128a46380\nData copied to user address 0000000020000240\"\n\nPer Chuck Lever's suggestion, use kzalloc() instead of kmalloc() to\nsolve the problem.","modified":"2026-04-02T10:06:21.714200Z","published":"2024-04-17T10:27:50.374Z","related":["ALSA-2024:3618","ALSA-2024:3627","SUSE-SU-2024:1643-1","SUSE-SU-2024:1644-1","SUSE-SU-2024:1646-1","SUSE-SU-2024:1659-1","SUSE-SU-2024:1663-1","SUSE-SU-2024:1870-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26901.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3948abaa4e2be938ccdfc289385a27342fb13d43"},{"type":"WEB","url":"https://git.kernel.org/stable/c/423b6bdf19bbc5e1f7e7461045099917378f7e71"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4bac28f441e3cc9d3f1a84c8d023228a68d8a7c1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/772a7def9868091da3bcb0d6c6ff9f0c03d7fa8b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bf9ec1b24ab4e94345aa1c60811dd329f069c38b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c1362eae861db28b1608b9dc23e49634fe87b63b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cba138f1ef37ec6f961baeab62f312dedc7cf730"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cde76b3af247f615447bcfecf610bb76c3529126"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e6450d5e46a737a008b4885aa223486113bf0ad6"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26901.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26901"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"990d6c2d7aee921e3bce22b2d6a750fd552262be"},{"fixed":"4bac28f441e3cc9d3f1a84c8d023228a68d8a7c1"},{"fixed":"772a7def9868091da3bcb0d6c6ff9f0c03d7fa8b"},{"fixed":"cde76b3af247f615447bcfecf610bb76c3529126"},{"fixed":"423b6bdf19bbc5e1f7e7461045099917378f7e71"},{"fixed":"e6450d5e46a737a008b4885aa223486113bf0ad6"},{"fixed":"c1362eae861db28b1608b9dc23e49634fe87b63b"},{"fixed":"cba138f1ef37ec6f961baeab62f312dedc7cf730"},{"fixed":"bf9ec1b24ab4e94345aa1c60811dd329f069c38b"},{"fixed":"3948abaa4e2be938ccdfc289385a27342fb13d43"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26901.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}