CVE-2024-36966
Severity CVSS v4.0:
Pending analysis
Type:
CWE-824
Access of Uninitialized Pointer
Publication date:
08/06/2024
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
erofs: reliably distinguish block based and fscache mode<br />
<br />
When erofs_kill_sb() is called in block dev based mode, s_bdev may not<br />
have been initialised yet, and if CONFIG_EROFS_FS_ONDEMAND is enabled,<br />
it will be mistaken for fscache mode, and then attempt to free an anon_dev<br />
that has never been allocated, triggering the following warning:<br />
<br />
============================================<br />
ida_free called for id=0 which is not allocated.<br />
WARNING: CPU: 14 PID: 926 at lib/idr.c:525 ida_free+0x134/0x140<br />
Modules linked in:<br />
CPU: 14 PID: 926 Comm: mount Not tainted 6.9.0-rc3-dirty #630<br />
RIP: 0010:ida_free+0x134/0x140<br />
Call Trace:<br />
<br />
erofs_kill_sb+0x81/0x90<br />
deactivate_locked_super+0x35/0x80<br />
get_tree_bdev+0x136/0x1e0<br />
vfs_get_tree+0x2c/0xf0<br />
do_new_mount+0x190/0x2f0<br />
[...]<br />
============================================<br />
<br />
Now when erofs_kill_sb() is called, erofs_sb_info must have been<br />
initialised, so use sbi->fsid to distinguish between the two modes.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.6.32 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/7af2ae1b1531feab5d38ec9c8f472dc6cceb4606
- https://git.kernel.org/stable/c/dcdd49701e429c55b3644fd70fc58d85745f8cfe
- https://git.kernel.org/stable/c/f9b877a7ee312ec8ce17598a7ef85cb820d7c371
- https://git.kernel.org/stable/c/7af2ae1b1531feab5d38ec9c8f472dc6cceb4606
- https://git.kernel.org/stable/c/dcdd49701e429c55b3644fd70fc58d85745f8cfe
- https://git.kernel.org/stable/c/f9b877a7ee312ec8ce17598a7ef85cb820d7c371



