CVE-2024-41049

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
29/07/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> filelock: fix potential use-after-free in posix_lock_inode<br /> <br /> Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().<br /> The request pointer had been changed earlier to point to a lock entry<br /> that was added to the inode&amp;#39;s list. However, before the tracepoint could<br /> fire, another task raced in and freed that lock.<br /> <br /> Fix this by moving the tracepoint inside the spinlock, which should<br /> ensure that this doesn&amp;#39;t happen.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.257 (including) 5.4.280 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10.197 (including) 5.10.222 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.133 (including) 5.15.163 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.55 (including) 6.1.100 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6 (including) 6.6.41 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.9.10 (excluding)