CVE-2024-50010
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
exec: don&#39;t WARN for racy path_noexec check<br />
<br />
Both i_mode and noexec checks wrapped in WARN_ON stem from an artifact<br />
of the previous implementation. They used to legitimately check for the<br />
condition, but that got moved up in two commits:<br />
633fb6ac3980 ("exec: move S_ISREG() check earlier")<br />
0fd338b2d2cd ("exec: move path_noexec() check earlier")<br />
<br />
Instead of being removed said checks are WARN_ON&#39;ed instead, which<br />
has some debug value.<br />
<br />
However, the spurious path_noexec check is racy, resulting in<br />
unwarranted warnings should someone race with setting the noexec flag.<br />
<br />
One can note there is more to perm-checking whether execve is allowed<br />
and none of the conditions are guaranteed to still hold after they were<br />
tested for.<br />
<br />
Additionally this does not validate whether the code path did any perm<br />
checking to begin with -- it will pass if the inode happens to be<br />
regular.<br />
<br />
Keep the redundant path_noexec() check even though it&#39;s mindless<br />
nonsense checking for guarantee that isn&#39;t given so drop the WARN.<br />
<br />
Reword the commentary and do small tidy ups while here.<br />
<br />
[brauner: keep redundant path_noexec() check]
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0bdf77be2330062b3a64f2bec39f62ab874a6796
- https://git.kernel.org/stable/c/0d16f53c91111cec914f0811fcc526a2ba77b20d
- https://git.kernel.org/stable/c/0d196e7589cefe207d5d41f37a0a28a1fdeeb7c6
- https://git.kernel.org/stable/c/b723f96407a0a078cf75970e4dbf16b46d286a61
- https://git.kernel.org/stable/c/c9b77438077d5a20c79ead95bcdaf9bd4797baaf
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



