CVE-2024-50280
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
19/11/2024
Last modified:
02/05/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
dm cache: fix flushing uninitialized delayed_work on cache_ctr error<br />
<br />
An unexpected WARN_ON from flush_work() may occur when cache creation<br />
fails, caused by destroying the uninitialized delayed_work waker in the<br />
error path of cache_create(). For example, the warning appears on the<br />
superblock checksum error.<br />
<br />
Reproduce steps:<br />
<br />
dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"<br />
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"<br />
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"<br />
dd if=/dev/urandom of=/dev/mapper/cmeta bs=4k count=1 oflag=direct<br />
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \<br />
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"<br />
<br />
Kernel logs:<br />
<br />
(snip)<br />
WARNING: CPU: 0 PID: 84 at kernel/workqueue.c:4178 __flush_work+0x5d4/0x890<br />
<br />
Fix by pulling out the cancel_delayed_work_sync() from the constructor&#39;s<br />
error path. This patch doesn&#39;t affect the use-after-free fix for<br />
concurrent dm_resume and dm_destroy (commit 6a459d8edbdb ("dm cache: Fix<br />
UAF in destroy()")) as cache_dtr is not changed.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9.337 (including) | 4.10 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.303 (including) | 4.15 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.270 (including) | 4.20 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.229 (including) | 5.5 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.163 (including) | 5.11 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.87 (including) | 5.16 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0.18 (including) | 6.1 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.4 (including) | 6.1.117 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.61 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.8 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/135496c208ba26fd68cdef10b64ed7a91ac9a7ff
- https://git.kernel.org/stable/c/40fac0271c7aedf60d81ed8214e80851e5b26312
- https://git.kernel.org/stable/c/5a754d3c771280f2d06bf8ab716d6a0d36ca256e
- https://git.kernel.org/stable/c/8cc12dab635333c4ea28e72d7b947be7d0543c2c
- https://git.kernel.org/stable/c/aee3ecda73ce13af7c3e556383342b57e6bd0718
- https://git.kernel.org/stable/c/d154b333a5667b6c1b213a11a41ad7aaccd10c3d