Lucene search

K
redhatcveRedhat.comRH:CVE-2024-40900
HistoryJul 16, 2024 - 2:23 p.m.

CVE-2024-40900

2024-07-1614:23:00
redhat.com
access.redhat.com
2
linux kernel
vulnerability
cachefiles
xarray
concurrency
mount
daemon_thread
kzalloc
wait_for_completion
daemon_read
close dev fd
cache_reqs
use-after-free
xa_destroy.

AI Score

6.8

Confidence

Low

In the Linux kernel, the following vulnerability has been resolved: cachefiles: remove requests from xarray during flushing requests Even with CACHEFILES_DEAD set, we can still read the requests, so in the following concurrency the request may be used after it has been freed: mount | daemon_thread1 | daemon_thread2 ------------------------------------------------------------ cachefiles_ondemand_init_object cachefiles_ondemand_send_req REQ_A = kzalloc(sizeof(*req) + data_len) wait_for_completion(&REQ;_A->done) cachefiles_daemon_read cachefiles_ondemand_daemon_read // close dev fd cachefiles_flush_reqs complete(&REQ;_A->done) kfree(REQ_A) xa_lock(&cache-;>reqs); cachefiles_ondemand_select_req req->msg.opcode != CACHEFILES_OP_READ // req use-after-free !!! xa_unlock(&cache-;>reqs); xa_destroy(&cache-;>reqs) Hence remove requests from cache->reqs when flushing them to avoid accessing freed requests.

AI Score

6.8

Confidence

Low