CVE-2024-40956

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list Use list_for_each_entry_safe() to allow iterating through the list and deleting the entry in the iteration process. The descriptor is freed via idxd_desc_complete() and there's a slight chance may cause issue for the list iterator when the descriptor is reused by another thread without it being deleted from the list.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*

History

28 Aug 2024, 18:58

Type Values Removed Values Added
CWE CWE-416
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/1b08bf5a17c66ab7dbb628df5344da53c8e7ab33 - () https://git.kernel.org/stable/c/1b08bf5a17c66ab7dbb628df5344da53c8e7ab33 - Patch
References () https://git.kernel.org/stable/c/83163667d881100a485b6c2daa30301b7f68d9b5 - () https://git.kernel.org/stable/c/83163667d881100a485b6c2daa30301b7f68d9b5 - Patch
References () https://git.kernel.org/stable/c/a14968921486793f2a956086895c3793761309dd - () https://git.kernel.org/stable/c/a14968921486793f2a956086895c3793761309dd - Patch
References () https://git.kernel.org/stable/c/e3215deca4520773cd2b155bed164c12365149a7 - () https://git.kernel.org/stable/c/e3215deca4520773cd2b155bed164c12365149a7 - Patch
References () https://git.kernel.org/stable/c/faa35db78b058a2ab6e074ee283f69fa398c36a8 - () https://git.kernel.org/stable/c/faa35db78b058a2ab6e074ee283f69fa398c36a8 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: idxd: corrija posible Use-After-Free en irq_process_work_list Use list_for_each_entry_safe() para permitir iterar a través de la lista y eliminar la entrada en el proceso de iteración. El descriptor se libera a través de idxd_desc_complete() y existe una pequeña posibilidad de que cause problemas para el iterador de la lista cuando otro subproceso reutiliza el descriptor sin que se elimine de la lista.

12 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2024-08-28 18:58


NVD link : CVE-2024-40956

Mitre link : CVE-2024-40956

CVE.ORG link : CVE-2024-40956


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free