In the Linux kernel, the following vulnerability has been resolved:
filelock: fix potential use-after-free in posix_lock_inode
Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().
The request pointer had been changed earlier to point to a lock entry
that was added to the inode's list. However, before the tracepoint could
fire, another task raced in and freed that lock.
Fix this by moving the tracepoint inside the spinlock, which should
ensure that this doesn't happen.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967 - Patch | |
References | () https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2 - Patch | |
References | () https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92 - Patch | |
References | () https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197 - Patch | |
References | () https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a - Patch | |
References | () https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0 - Patch | |
References | () https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b - Patch |
26 Aug 2024, 15:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967 - Patch | |
References | () https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2 - Patch | |
References | () https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92 - Patch | |
References | () https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197 - Patch | |
References | () https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a - Patch | |
References | () https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0 - Patch | |
References | () https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b - Patch | |
CWE | CWE-416 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux
Linux linux Kernel |
29 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 15:15
Updated : 2024-11-21 09:32
NVD link : CVE-2024-41049
Mitre link : CVE-2024-41049
CVE.ORG link : CVE-2024-41049
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free