Lucene search

K
cveLinuxCVE-2024-41049
HistoryJul 29, 2024 - 3:15 p.m.

CVE-2024-41049

2024-07-2915:15:13
CWE-416
Linux
web.nvd.nist.gov
32
linux kernel
use-after-free
filelock
posix lock inode
vulnerability

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

Low

EPSS

0

Percentile

5.0%

In the Linux kernel, the following vulnerability has been resolved:

filelock: fix potential use-after-free in posix_lock_inode

Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().
The request pointer had been changed earlier to point to a lock entry
that was added to the inode’s list. However, before the tracepoint could
fire, another task raced in and freed that lock.

Fix this by moving the tracepoint inside the spinlock, which should
ensure that this doesn’t happen.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange5.4.2575.4.280
OR
linuxlinux_kernelRange5.10.1975.10.222
OR
linuxlinux_kernelRange5.15.1335.15.163
OR
linuxlinux_kernelRange6.1.556.1.100
OR
linuxlinux_kernelRange6.66.6.41
OR
linuxlinux_kernelRange6.76.9.10
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "fs/locks.c"
    ],
    "versions": [
      {
        "version": "117fb80cd1e6",
        "lessThan": "1cbbb3d9475c",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a6f4129378ca",
        "lessThan": "7d4c14f4b511",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "766e56faddbe",
        "lessThan": "02a896426075",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "34bff6d85001",
        "lessThan": "5cb36e35bc10",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "74f6f5912693",
        "lessThan": "432b06b69d1d",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "74f6f5912693",
        "lessThan": "116599f6a269",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "74f6f5912693",
        "lessThan": "1b3ec4f7c03d",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "fs/locks.c"
    ],
    "versions": [
      {
        "version": "6.6",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "6.6",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.280",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.222",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.163",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.100",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.41",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9.10",
        "lessThanOrEqual": "6.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

Low

EPSS

0

Percentile

5.0%