CVE-2024-41030
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
29/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: discard write access to the directory open<br />
<br />
may_open() does not allow a directory to be opened with the write access.<br />
However, some writing flags set by client result in adding write access<br />
on server, making ksmbd incompatible with FUSE file system. Simply, let&#39;s<br />
discard the write access when opening a directory.<br />
<br />
list_add corruption. next is NULL.<br />
------------[ cut here ]------------<br />
kernel BUG at lib/list_debug.c:26!<br />
pc : __list_add_valid+0x88/0xbc<br />
lr : __list_add_valid+0x88/0xbc<br />
Call trace:<br />
__list_add_valid+0x88/0xbc<br />
fuse_finish_open+0x11c/0x170<br />
fuse_open_common+0x284/0x5e8<br />
fuse_dir_open+0x14/0x24<br />
do_dentry_open+0x2a4/0x4e0<br />
dentry_open+0x50/0x80<br />
smb2_open+0xbe4/0x15a4<br />
handle_ksmbd_work+0x478/0x5ec<br />
process_one_work+0x1b4/0x448<br />
worker_thread+0x25c/0x430<br />
kthread+0x104/0x1d4<br />
ret_from_fork+0x10/0x20
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 6.1.100 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.41 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/198498b2049c0f11f7670be6974570e02b0cc035
- https://git.kernel.org/stable/c/66cf853e1c7a2407f15d9f7aaa3e47d61745e361
- https://git.kernel.org/stable/c/9e84b1ba5c98fb5c9f869c85db1d870354613baa
- https://git.kernel.org/stable/c/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd
- https://git.kernel.org/stable/c/198498b2049c0f11f7670be6974570e02b0cc035
- https://git.kernel.org/stable/c/66cf853e1c7a2407f15d9f7aaa3e47d61745e361
- https://git.kernel.org/stable/c/9e84b1ba5c98fb5c9f869c85db1d870354613baa
- https://git.kernel.org/stable/c/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



