CVE-2024-40938
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
landlock: Fix d_parent walk<br />
<br />
The WARN_ON_ONCE() in collect_domain_accesses() can be triggered when<br />
trying to link a root mount point. This cannot work in practice because<br />
this directory is mounted, but the VFS check is done after the call to<br />
security_path_link().<br />
<br />
Do not use source directory&#39;s d_parent when the source directory is the<br />
mount point.<br />
<br />
[mic: Fix commit message]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19 (including) | 6.1.95 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc
- https://git.kernel.org/stable/c/b6e5e696435832b33e40775f060ef5c95f4fda1f
- https://git.kernel.org/stable/c/c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6
- https://git.kernel.org/stable/c/cc30d05b34f9a087a6928d09b131f7b491e9ab11
- https://git.kernel.org/stable/c/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc
- https://git.kernel.org/stable/c/b6e5e696435832b33e40775f060ef5c95f4fda1f
- https://git.kernel.org/stable/c/c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6
- https://git.kernel.org/stable/c/cc30d05b34f9a087a6928d09b131f7b491e9ab11
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



