CVE-2024-58085

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-58085
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-58085.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-58085
Downstream
Related
Published
2025-03-06T16:22:32.761Z
Modified
2025-11-28T02:35:26.124189Z
Summary
tomoyo: don't emit warning in tomoyo_write_control()
Details

In the Linux kernel, the following vulnerability has been resolved:

tomoyo: don't emit warning in tomoyowritecontrol()

syzbot is reporting too large allocation warning at tomoyowritecontrol(), for one can write a very very long line without new line character. To fix this warning, I use _GFPNOWARN rather than checking for KMALLOCMAXSIZE, for practically a valid line should be always shorter than 32KB where the "too small to fail" memory-allocation rule applies.

One might try to write a valid line that is longer than 32KB, but such request will likely fail with -ENOMEM. Therefore, I feel that separately returning -EINVAL when a line is longer than KMALLOCMAXSIZE is redundant. There is no need to distinguish over-32KB and over-KMALLOCMAXSIZE.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/58xxx/CVE-2024-58085.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
c67efabddc73171c7771d3ffe4ffa1e503ee533e
Fixed
f6b37b3e12de638753bce79a2858070b9c4a4ad3
Fixed
b2bd5857a0d6973ebbcb4d9831ddcaebbd257be1
Fixed
a01c200fa7eb59da4d2dbbb48b61f4a0d196c09f
Fixed
fe1c021eb03dae0dc9dce55e81f77a60e419a27a
Fixed
c9382f380e8d09209b8e5c0def0545852168be25
Fixed
414705c0303350d139b1dc18f329fe47dfb642dd
Fixed
3df7546fc03b8f004eee0b9e3256369f7d096685

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.291
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.235
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.179
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.129
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.78
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.14
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.3