CVE-2024-38570

In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix potential glock use-after-free on unmount When a DLM lockspace is released and there ares still locks in that lockspace, DLM will unlock those locks automatically. Commit fb6791d100d1b started exploiting this behavior to speed up filesystem unmount: gfs2 would simply free glocks it didn't want to unlock and then release the lockspace. This didn't take the bast callbacks for asynchronous lock contention notifications into account, which remain active until until a lock is unlocked or its lockspace is released. To prevent those callbacks from accessing deallocated objects, put the glocks that should not be unlocked on the sd_dead_glocks list, release the lockspace, and only then free those glocks. As an additional measure, ignore unexpected ast and bast callbacks if the receiving glock is dead.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0636b34b44589b142700ac137b5f69802cfe2e37 - Patch () https://git.kernel.org/stable/c/0636b34b44589b142700ac137b5f69802cfe2e37 - Patch
References () https://git.kernel.org/stable/c/501cd8fabf621d10bd4893e37f6ce6c20523c8ca - Patch () https://git.kernel.org/stable/c/501cd8fabf621d10bd4893e37f6ce6c20523c8ca - Patch
References () https://git.kernel.org/stable/c/d98779e687726d8f8860f1c54b5687eec5f63a73 - Patch () https://git.kernel.org/stable/c/d98779e687726d8f8860f1c54b5687eec5f63a73 - Patch
References () https://git.kernel.org/stable/c/e42e8a24d7f02d28763d16ca7ec5fc6d1f142af0 - Patch () https://git.kernel.org/stable/c/e42e8a24d7f02d28763d16ca7ec5fc6d1f142af0 - Patch

01 Aug 2024, 20:25

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0636b34b44589b142700ac137b5f69802cfe2e37 - () https://git.kernel.org/stable/c/0636b34b44589b142700ac137b5f69802cfe2e37 - Patch
References () https://git.kernel.org/stable/c/501cd8fabf621d10bd4893e37f6ce6c20523c8ca - () https://git.kernel.org/stable/c/501cd8fabf621d10bd4893e37f6ce6c20523c8ca - Patch
References () https://git.kernel.org/stable/c/d98779e687726d8f8860f1c54b5687eec5f63a73 - () https://git.kernel.org/stable/c/d98779e687726d8f8860f1c54b5687eec5f63a73 - Patch
References () https://git.kernel.org/stable/c/e42e8a24d7f02d28763d16ca7ec5fc6d1f142af0 - () https://git.kernel.org/stable/c/e42e8a24d7f02d28763d16ca7ec5fc6d1f142af0 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: gfs2: soluciona el posible use-after-free de glock al desmontar Cuando se libera un espacio de bloqueo de DLM y todavía hay bloqueos en ese espacio de bloqueo, DLM desbloqueará esos bloqueos automáticamente. El commit fb6791d100d1b comenzó a explotar este comportamiento para acelerar el desmontaje del sistema de archivos: gfs2 simplemente liberaría las glocks que no quería desbloquear y luego liberaría el espacio de bloqueo. Esto no tuvo en cuenta las devoluciones de llamada de bast para notificaciones de contención de bloqueo asincrónicas, que permanecen activas hasta que se desbloquea un bloqueo o se libera su espacio de bloqueo. Para evitar que esas devoluciones de llamada accedan a objetos desasignados, coloque las glocks que no deben desbloquearse en la lista sd_dead_glocks, libere el espacio de bloqueo y solo entonces libere esas glocks. Como medida adicional, ignore las devoluciones de llamada inesperadas de ast y bast si la glock receptora está muerta.

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2024-11-21 09:26


NVD link : CVE-2024-38570

Mitre link : CVE-2024-38570

CVE.ORG link : CVE-2024-38570


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free