CVE-2024-41049

In the Linux kernel, the following vulnerability has been resolved: filelock: fix potential use-after-free in posix_lock_inode Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode(). The request pointer had been changed earlier to point to a lock entry that was added to the inode's list. However, before the tracepoint could fire, another task raced in and freed that lock. Fix this by moving the tracepoint inside the spinlock, which should ensure that this doesn't happen.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967 - Patch () https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967 - Patch
References () https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2 - Patch () https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2 - Patch
References () https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92 - Patch () https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92 - Patch
References () https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197 - Patch () https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197 - Patch
References () https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a - Patch () https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a - Patch
References () https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0 - Patch () https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0 - Patch
References () https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b - Patch () https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b - Patch

26 Aug 2024, 15:11

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967 - () https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967 - Patch
References () https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2 - () https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2 - Patch
References () https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92 - () https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92 - Patch
References () https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197 - () https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197 - Patch
References () https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a - () https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a - Patch
References () https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0 - () https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0 - Patch
References () https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b - () https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b - Patch
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: filelock: corrige el posible use after free en posix_lock_inode Light Hsieh informó una advertencia de KASAN UAF en trace_posix_lock_inode(). El puntero de solicitud se había cambiado anteriormente para apuntar a una entrada de bloqueo que se agregó a la lista del inodo. Sin embargo, antes de que el punto de rastreo pudiera activarse, otra tarea entró rápidamente y liberó ese bloqueo. Solucione este problema moviendo el punto de seguimiento dentro del spinlock, lo que debería garantizar que esto no suceda.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel

29 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 15:15

Updated : 2024-11-21 09:32


NVD link : CVE-2024-41049

Mitre link : CVE-2024-41049

CVE.ORG link : CVE-2024-41049


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free