CVE-2024-39493

In the Linux kernel, the following vulnerability has been resolved: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak Using completion_done to determine whether the caller has gone away only works after a complete call. Furthermore it's still possible that the caller has not yet called wait_for_completion, resulting in another potential UAF. Fix this by making the caller use cancel_work_sync and then freeing the memory safely.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Jul 2024, 15:38

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0ce5964b82f212f4df6a9813f09a0b5de15bd9c8 - () https://git.kernel.org/stable/c/0ce5964b82f212f4df6a9813f09a0b5de15bd9c8 - Patch
References () https://git.kernel.org/stable/c/3fb4601e0db10d4fe25e46f3fa308d40d37366bd - () https://git.kernel.org/stable/c/3fb4601e0db10d4fe25e46f3fa308d40d37366bd - Patch
References () https://git.kernel.org/stable/c/6396b33e98c096bff9c253ed49c008247963492a - () https://git.kernel.org/stable/c/6396b33e98c096bff9c253ed49c008247963492a - Patch
References () https://git.kernel.org/stable/c/a718b6d2a329e069b27d9049a71be5931e71d960 - () https://git.kernel.org/stable/c/a718b6d2a329e069b27d9049a71be5931e71d960 - Patch
References () https://git.kernel.org/stable/c/c2d443aa1ae3175c13a665f3a24b8acd759ce9c3 - () https://git.kernel.org/stable/c/c2d443aa1ae3175c13a665f3a24b8acd759ce9c3 - Patch
References () https://git.kernel.org/stable/c/d0fd124972724cce0d48b9865ce3e273ef69e246 - () https://git.kernel.org/stable/c/d0fd124972724cce0d48b9865ce3e273ef69e246 - Patch
References () https://git.kernel.org/stable/c/d3b17c6d9dddc2db3670bc9be628b122416a3d26 - () https://git.kernel.org/stable/c/d3b17c6d9dddc2db3670bc9be628b122416a3d26 - Patch
References () https://git.kernel.org/stable/c/e7428e7e3fe94a5089dc12ffe5bc31574d2315ad - () https://git.kernel.org/stable/c/e7428e7e3fe94a5089dc12ffe5bc31574d2315ad - Patch
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

11 Jul 2024, 13:05

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: crypto: qat: corrige la pérdida de memoria ADF_DEV_RESET_SYNC. El uso de complete_done para determinar si la persona que llama se ha ido solo funciona después de una llamada completa. Además, aún es posible que la persona que llama aún no haya llamado a wait_for_completion, lo que genera otra posible UAF. Solucione este problema haciendo que la persona que llama use cancel_work_sync y luego liberando la memoria de forma segura.

10 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-10 08:15

Updated : 2024-07-31 15:38


NVD link : CVE-2024-39493

Mitre link : CVE-2024-39493

CVE.ORG link : CVE-2024-39493


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime