CVE-2024-38570
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
19/06/2024
Last modified:
01/08/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
gfs2: Fix potential glock use-after-free on unmount<br />
<br />
When a DLM lockspace is released and there ares still locks in that<br />
lockspace, DLM will unlock those locks automatically. Commit<br />
fb6791d100d1b started exploiting this behavior to speed up filesystem<br />
unmount: gfs2 would simply free glocks it didn&#39;t want to unlock and then<br />
release the lockspace. This didn&#39;t take the bast callbacks for<br />
asynchronous lock contention notifications into account, which remain<br />
active until until a lock is unlocked or its lockspace is released.<br />
<br />
To prevent those callbacks from accessing deallocated objects, put the<br />
glocks that should not be unlocked on the sd_dead_glocks list, release<br />
the lockspace, and only then free those glocks.<br />
<br />
As an additional measure, ignore unexpected ast and bast callbacks if<br />
the receiving glock is dead.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.8 (including) | 6.6.33 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.12 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.9.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page