CVE-2024-36966

Severity CVSS v4.0:
Pending analysis
Type:
CWE-824 Access of Uninitialized Pointer
Publication date:
08/06/2024
Last modified:
01/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> erofs: reliably distinguish block based and fscache mode<br /> <br /> When erofs_kill_sb() is called in block dev based mode, s_bdev may not<br /> have been initialised yet, and if CONFIG_EROFS_FS_ONDEMAND is enabled,<br /> it will be mistaken for fscache mode, and then attempt to free an anon_dev<br /> that has never been allocated, triggering the following warning:<br /> <br /> ============================================<br /> ida_free called for id=0 which is not allocated.<br /> WARNING: CPU: 14 PID: 926 at lib/idr.c:525 ida_free+0x134/0x140<br /> Modules linked in:<br /> CPU: 14 PID: 926 Comm: mount Not tainted 6.9.0-rc3-dirty #630<br /> RIP: 0010:ida_free+0x134/0x140<br /> Call Trace:<br /> <br /> erofs_kill_sb+0x81/0x90<br /> deactivate_locked_super+0x35/0x80<br /> get_tree_bdev+0x136/0x1e0<br /> vfs_get_tree+0x2c/0xf0<br /> do_new_mount+0x190/0x2f0<br /> [...]<br /> ============================================<br /> <br /> Now when erofs_kill_sb() is called, erofs_sb_info must have been<br /> initialised, so use sbi-&gt;fsid to distinguish between the two modes.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6 (including) 6.6.32 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.11 (excluding)
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*