CVE-2024-42250
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cachefiles: add missing lock protection when polling<br />
<br />
Add missing lock protection in poll routine when iterating xarray,<br />
otherwise:<br />
<br />
Even with RCU read lock held, only the slot of the radix tree is<br />
ensured to be pinned there, while the data structure (e.g. struct<br />
cachefiles_req) stored in the slot has no such guarantee. The poll<br />
routine will iterate the radix tree and dereference cachefiles_req<br />
accordingly. Thus RCU read lock is not adequate in this case and<br />
spinlock is needed here.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.9.10 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/6bb6bd3dd6f382dfd36220d4b210a0c77c066651
- https://git.kernel.org/stable/c/8eadcab7f3dd809edbe5ae20533ff843dfea3a07
- https://git.kernel.org/stable/c/97cfd5e20ddc2e33e16ce369626ce76c9a475fd7
- https://git.kernel.org/stable/c/cf5bb09e742a9cf6349127e868329a8f69b7a014
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



